Wireless Extension of RFID-based Sensor System for Infrastructure Health Monitoring
Rohit Sawlani
<17448521>
A report submitted for
300597 Master Engineering Project 1
In partial fulfillment of the requirements for the degree of
Supervisor:-
Associate Professor Sergiy Kharkivskiy
Associate Professor in Sensor Technology
Centre for Infrastructure Engineering
School of Computing, Engineering and Mathematics
Kingswood Campus
School of Computing, Engineering and Mathematics
Western Sydney University
ABSTRACT
RFID-based sensor system for infrastructure health monitoring consists of mountable sensor integrated UHF RFID tag antennas, a Generation 2 UHF RFID reader and a computer/laptop (which runs reader configuration and data acquisition applications). Even though enhanced communication range (read range) of the system can be achieved using suitably designed RFID tag antennas, limitations are there due to structural environments and the passive backscatter communication of the RFID technology. Therefore, the system should be further enhanced for remote monitoring, incorporating another wireless technology (e.g., Wi-Fi, GSM 3G/4G, etc.) which supports long-range communication. Basic wireless extension would be a point-to-point wireless link connecting the Generation 2 UHF RFID reader of the sensor system (attached to the infrastructure such as a bridge or a building) and a computer/laptop stationed at a remote monitoring station.
ACKNOWLEDGMENTS
Conducting this research has been one of the most enriching experiences of my life. The contribution of this research to enhance my knowledge base and analytical skill has been paramount. It gave me the opportunity to face challenges in the process and overcome them. This would not have been possible without the valuable guidance of my professors, peers and all the people who have contributed to this enriching experience. I would like to take this opportunity to thank my supervisor Associate Professor Sergiy Kharkivskiy, Centre for Infrastructure Engineering (CIE), SCEM for the constant guidance and support provided to me during the process of this research. It would not be justified if I did not thank my academic guides for their important and valuable assistance and encouragement throughout the research process. I would like to thank Devaka Jayawardana for constant support when I needed it. The support of all these people has been inspiring and enlightening throughout the process of research in the subject.
Heartfelt thanks and warmest wishes,
Yours Sincerely,
Rohit Sawlani
Contents
Chapter 1: INTRODUCTION 1
1.1 Background of the Study 1
1.2 Problem Statement 2
1.3 Aim/Objective of the study 2
1.4 Research Question 2
1.5 Nature of the Study 2
1.6 Significance of the Study 3
1.7 Chapter Summary 3
CHAPTER II: LITERATURE REVIEW 4
2.1 Introduction to Reviewing Literatures 4
2.2 Documentation of the Chapter 4
2.3 RFID based wireless infrastructure: Our system (concept of RFID- based sensor system) 5
2.4 General Schematic Diagram 6
2.5 Conceptual Framework 7
2.6 Familiarization of Functionality, Extensibility, and Interfacing Options 8
2.6.1 Speedway Reader Features and Benefits 8
2.6.2 Durability and High Mean Time between Failure 8
2.6.3 Other Software Features 8
2.7 Long Range Low Power Wireless Technologies for Point-to-Point Wireless Link between Generation2 UHF RFID Reader and Device 9
2.8 Suggestion of Optimal Components 10
2.9 Different Frequency Band Consideration and Review 11
2.10 Detailed Comparison In between Three Types of RFID Readers 13
2.11 Chapter Summary 14
CHAPTER III: METHODOLOGY 15
3.1 Design and Method of the Study 15
3.2 Instruments for Study 15
3.3 Wireless link between Reader and Laptop (Our System) 16
3.4 Validation and Reliability 17
3.5 Assumptions 17
3.6 Limitations of the Study 17
3.7 Ethical Considerations 18
3.8 Timeline of the Study 19
3.9 Chapter Summary 20
CHAPTER IV: SUMMARY AND RESEARCH PLAN 21
4.1 Conclusion 21
4.2 Importance of Linking with Objectives 21
4.3 Implications of Research 22
4.4 Identification of Recommendations and Requirements 22
4.5 Realization of Study Future Scopes 23
4.6 Realization of Study Limitations 23
REFERENCES 24
List of Figures and Tables:
Figure 1.1…………………………………………………………………………………1
Figure 2.1…………………………………………………………………………………9
Figure 2.2……………………………………………………………………………….10
Table 1………………………………………………………………………………….11
Table 2………………………………………………………………………………….11
Table 3………………………………………………………………………………….17
Figure 3.1………………………………………………………………………………20
Table 4…………………………………………………………………………………24
Chapter 1: INTRODUCTION
1.1 Background of the Study
Infrastructure health monitoring (IHM) has been of great concern in the design, operation, maintenance, and repair of various large structures such as bridges and buildings, shown in Fig. 1.1. The IHM is based on the signal outputs from various kinds of sensors, which may include stress sensors, strain gauges , displacement transducers , temperature sensors and accelerometers.
Figure 1.1: Examples of large-scale structures: building (left) and bridge (right).
Radio-frequency identification (RFID) based sensory technology is a particular technology that is currently emerging as several premises of applications (Liu et al., 2012 and Happened et al., 2008). Entirely, the organizations are dependent over tracking objects, products, and materials with unique identification, and controlling inventory (Abad et al., 2012). Moreover, the existing industry follows suitable asset management under RFID tags based tracking and identification process. Currently, in the industry standard, the scope of RFID is changing and shifting towards dynamic inventory control with sensitive data handling and management.
The RFID sensor integration is hugely important for enabling the RFID technology for gathering server data. Based on such emerging technology ramifications, the current proposal depicts the related studies and relevant practice of RFID sensor, reader and tag based health monitoring system (Abdulhadi & Abhari, 2016). Therefore, the proposal studies about generation 2 UHF RFID readers, their functionality, application, UHF RFID tags, their operation for monitoring module design.
1.2 Problem Statement
Existing infrastructures and construction sectors are facing significant amount of challenge to monitor every bit of data; including structural faults, their balance, load adjustment, poor materials, and bolts snapping. Currently, the construction sectors are facing higher cost and expenditure for buying several equipment and tracking modules. Apart from buying these modules, the construction sectors and building structure monitoring process can be managed with implementing RFID monitoring system. However, the current situation occurs as the construction sectors are focusing over saving lives from collapsing, therefore, the innovation and suitable utilization of technology is lacking. The main problem for our system is wireless extension of RFID. In other words, how to increase the wireless length or wireless range.
1.3 Aim/Objective of the study
The aim of this project is to increase the length of wireless connectivity between RFID reader and Workstation for remote monitoring. The overall objective of this study is to create the extension which is very short in our system, so to increase the length of wireless will be our prime objective so that the data required from the reader can be available sitting far away from the reader.
1.4 Research Question
Research questions require defining present study approach and outline. Moreover, to satisfy the research purpose, particular research question needs to be answered. Therefore, appropriate study question is to be identified. Aligning with the purpose of the study, the central question is pointed out as:
The main research question for our system: - Is it possible to extend the wireless length?
1.5 Nature of the Study
Nature of the study clearly states that this study should be empirical along with studying certain problem domains in infrastructure maintenance. The domains are included as reduction of load on bridge, structural faults, and poor materials selection, balance control, excessive weight tracking and tracing bolt and chain attachment (De Donno et al., 2014). However, the study is centered in terms of RFID based module design practices along with reviewing prior studies (Rodriguez-Rodriguez et al., 2012). The studies should be essential to depict the relevant limitations, design problems, issues in tag implementation, and module design as well. The related studies can demonstrate the use of RFID technology in the construction sector (Occhiuzzi et al., 2013). The tracking and tracing information of objects such as structural faults, poor materials, balance control, and excessive weight tracking; should be utilized with RFID technology.
1.6 Significance of the Study
Current study and proposal is primarily aimed at defining the functionality of Generation 2 UHF RFID reader, identifying the extensibilities, and interfacing properties. Moreover, whether the use of multiple power supplies and other added components for Generation 2 UHF RFID reader is necessary or not is to be determined in the study (Girbau et al., 2012). Maximum throughput is to be considered with maximum RFID tags for that particular reader for maximum data rate obtainment. The literature review section is important for providing a comprehension over long range low power wireless technologies for setting point-to-point wireless link between Generation2 UHF RFID reader and a system (Perret et al., 2012). Furthermore, maximum range and optimal parameters are to be identified along with the study.
1.7 Chapter Summary
The overall chapter aim is to introduce the study as the introduction part requires identifying the study background, purpose, research questions and significance. These are the elementary subparts of any introduction part. The existing organizations and industries follow sustainable asset management with RFID tags assisted tracking process. RFID sensor integration is dully important for enabling RFID technology for gathering inventory data and information. The proposal conducts linking between operational aspects of Generation 2 UHF RFID readers, their functionality, application, UHF RFID tags, and their operation for monitoring module design. In short, aim of the proposal is to employ Radio-frequency identification (RFID) with mountable RFID sensors, integrated UHF RFID tag, and generation 2 UHF RFID readers along with computer. Nature of the study clearly states that this study should be empirical along with studying certain problem domains. The related studies can demonstrate the use of RFID technology in the construction sector. Current study and proposal is primarily aimed at defining the functionality of Generation 2 UHF RFID reader, identifying the extensibilities, and interfacing properties. Further chapters are included in the proposal for meeting all the requirements of the entire research work.
CHAPTER II: LITERATURE REVIEW
2.1 Introduction to Reviewing Literatures
The literature review section is essential with including all the relevant information about RFID technology integration. The RFID tag, reader, and smart processing are to be utilized for tracking and tracing structural faults and poor materials (Geng et al., 2014). The construction sector requires following suitable mechanisms for effective materials identification, balance controlling, and consistent sensing of excessive weight. The overall identification process is considered to be along with a module deployment. The module design and developing process is considered in the further sections for detailed analysis (Bai et al., 2012). Moreover, the reviewing of literature is justified for studying the functionality, wireless extensibilities, and reader interfacing with RFID tagging module design.
2.2 Documentation of the Chapter
The documentation of the chapter suggests the suitable practices to shape the reviewing procedure with effective aspects for consideration. Now, the literature reviewing process can be subjective with application of some related studies (Duroc & Vera, 2014). The related studies are effective with jotting down all primary points under the sections. The aim of the chapter is to depict all the important characteristics of the wireless extensibilities under the research. The study is aimed not only realizing the RFID technology in practices, but also considering the use wireless technologies for RFID tag and reader implementation.
The literature review section is demonstrated as showing Speedway R420 and Speedway R220 UHF RFID readers along with functionality, features, and benefits (Chen et al., 2012). Again, some other additional software features are included in the study for gathering more information in detailed manner. Now as per the task and research work, the long range and low power wireless technologies are incorporated with suitable strategic implementation. There are some certain techniques are included in the comprehensive literature review section for showing several choices for making suitable design in this aspect (Papapostolou & Chaouchi, 2012). Furthermore, the components and the layer wise RFID implementation is prompted for better design mechanism with fault tolerance. Some prior studies and their innovative approach are presented in tabular format for showing particular design specifications (Safkhani et al., 2012). Finally, the criteria based RFID systems are included with particular range coverage, tags limit and cost.
2.3 RFID based wireless infrastructure: Our system (concept of RFID- based sensor system)
The RFID –based wireless IHM System proposed in CIE, SCEM is shown in Fig. 2.1.
Figure 2.1: - RFID based wireless infrastructure health monitoring system where sensor integrated RFID tags mounted on a structural member (Jayawardana, et al, 2016).
The sensor integrated RFID tags are mounted on structural members to acquire measurements. In general, the sensor can be any analog or digital transducer of a physical quantity that is useful in determining the state of the infrastructure, such as strain, dynamic acceleration, and displacement (Jayawardana, et al, 2016). RFID reader functionality is integrated to a commercial wireless node to provide the system with the capability of wireless networking. Wireless nodes of the same type in different sections of large-scale infrastructure can operate in a wireless network where the Web server in the same wireless network collects the sensor data which can be accessed via the Internet. This provides the advantage of low-cost, low-power RFID technology to support the need of dense population of sensors in largescale infrastructure monitoring and the feasibility of local infrastructure health monitoring using a wireless system. This was about the measurement of system with sensor integrated RFID tags.
In our system workstation remote monitoring can be any laptop or personal computer which is used to monitor the data. The data is collected from RFID reader which is attached with RFID tags. From Figure 2.1, consider a structural block and it is mounted by sensor integrated RFID tags on it, the antenna which is connected with RFID reader sends waves and the data is collected from that block. Now there is a RFID reader integrated wireless node which is in RFID reader. Through short distance the antenna sends the data through wireless network from webserver i.e. the wireless data is send just through short or small distance. The data is then monitored by laptop or any workstation.
This is the working of our system.
2.4 General Schematic Diagram
The schematic diagram of whole system is in Fig. 2.2:
SCHEMATIC DIAGRAM
Figure 2.2 General Schematic diagram.
2.5 Conceptual Framework
Conceptual framework in research is identified as relating concepts, empirical studies, and relevant theories for advancing more systematic knowledge application on the topic (Massawe et al., 2012). Some concepts and theories are identified to have practical popularity among the researchers; again, research about some agenda may have sporadic evaluations. The conceptual framework suggests suitable approach with explorative, deductive, and analysis process. According to Boyer & Roy (2012), conceptual framework design is a worthy way to emphasize over the entire research work with incorporating all the relevant objectives and initiatives. In this particular study, the conceptual framework is designed to include all the relevant section discussion along with systematic approach (Deyle et al., 2014). Moreover, the framework is a representation of the entire systematic approach in the study for incorporating the relevant structure for following the agenda. In this particular context, the framework is designed underneath:
Table 1: Conceptual Framework
(Source: Created by author)
2.6 Familiarization of Functionality, Extensibility, and Interfacing Options
The Speedway R420 and R220 readers deliver the reliable, quality performance necessary for maximum visibility of identified and tagged inventory materials (www.support.impinj.com, 2016). The readers are able to maintain high tag reading rates regardless of Radio Frequency noise or influential interference as the readers easily and automatically adapt to optimal functionality. Speedway readers are visible solution for several identified tags per second for individual items and materials (Dubok & Smolders, 2014). Speedway readers are supported by proper software support, hardware, and antennas that deliver application deployment along with flexible installations and expansion easier.
2.6.1 Speedway Reader Features and Benefits
The reader is generally available in 2-antenna port or 4-antenna port configurations with expandability up to 32 antennas with “Speedway Antenna Hub”. This process of expansion delivers lower total cost of reader possession and suitable flexibility (www.btgtecnologie.com, 2016). Exclusive of all patented Autopilot capability, the reader simplifies deployment and delivers more than 1,100 tag reads per second by automatically optimizing settings for best. The optimization is performed on most reliable and efficient performance that are:
I. Auto set: Continuously senses environmental Radio Frequency noise and other interference levels, automatically selects appropriate reader configurations
II. Low duty cycle: Reduces interference and power consumption as well as energy cost by only transmitting when tags are in field (Kumari et al., 2015)
III. Dynamic antenna switching: Senses the tags in the field and automatically portrays al of them on the antennas with the largest tag populations in view
2.6.2 Durability and High Mean Time between Failure
The software is built to simplify deployment of Item Intelligence solutions. Impinj ItemSense software aggregates and transforms torrents of raw RAIN RFID data from multiple readers into Item Intelligence information that integrates with third-party applications. ItemSense is scalable, flexible, and extensible, adapting to businesses as they grow to connect more items, more readers, and more locations. It facilitates a broad range of solutions for retailers, manufacturers, and construction providers.
2.6.3 Other Software Features
Speedway Connect is an on-reader application that enables you to properly set allowed configurations for an individual RFID reader and quickly access to RAIN RFID data through a simple web-based interface. Advanced users can quickly build on-reader applications with the Speedway Embedded Took Kit (ETK) or develop hosted applications that access the LLRP toolkit (LTK) through the Octane Software Development Kit (SDK). For high-throughput encoding operations, ItemEncode software increases the data transfer speed and quality of RAIN RFID encoded machines while lowering overall operational and maintenance costs.
2.7 Long Range Low Power Wireless Technologies for Point-to-Point Wireless Link between Generation2 UHF RFID Reader and Device
The essential close field UHF RFID reader implementation idea is to make UHF RFID framework work at short separations and on various items as dependably as LF/HF RFID (Chen & Chou, 2015). Beneath the researcher have portrayed a few ways to deal with executing close field UHF RFID frameworks utilizing existing reader modules and labeled ICs.
A. To start with, and most self-evident, methodology is to utilize a current UHF RFID framework with full reader yield force and standard (far-field) reader radio wires and labels. It can be normal that as a rule the UHF RFID label which can work in the far field ought to get more than satisfactory energy to work when conveyed nearer to RFID reader radio wire into the close field (Bendavid, 2013). In any case, a few applications require just short range perusing zone. Since the field area is not limited, such framework may inadvertently see some other (long range) labels present in far field district.
B. Second approach is to utilize low reader yield power mode in a current UHF RFID framework, with standard (far-field) reader reception apparatuses and labels. Such framework has most minimal cost (no new unique reader receiving wires or labels is required) (Khor et al., 2012). Be that as it may, due to lower reader yield power, elite (long range, material coldhearted) labels must be chosen to give satisfactory read execution on RF non-accommodating items.
C. Third approach is to utilize short range labels in a current UHF RFID framework, with standard (far-field) reader radio wire worked in full reader yield power mode (Bueno-Delgado & Pavon-Marino, 2013). The labels can either utilize attractive reception apparatuses or be standard labels deliberately bungled by tuning so they react just to solid fields in the region of the reader receiving wire. Such framework does not require unique reader reception apparatuses but rather, as in the primary approach, the field area is not limited and unexpected label peruses from far field zone are conceivable.
D. At last, anyone can utilize exceptional close field reader reception apparatuses and labels (Colella et al., 2016). Such framework will have the best execution however most elevated cost (new unique reader reception apparatuses and labels will be required) and can be outlined correspondingly to existing LF/HF RFID frameworks which use inductive reader curl receiving wires to make solid limited attractive field district (Chen et al., 2016). For UHF, the receiving wire curl sizes must be fittingly resized (downsized with recurrence).
In RFID-based facilities, complex occasion handling (CEP) structure is vital to guarantee effectiveness as it concentrates significant occasions for setting mindful applications. CEP structure maps the articles and practices in the physical world into their partner by semantically translating and changing information from RFID framework and sensors (Gong et al., 2012). With the blend of the CEP system and RFID innovation, it is fit to gather occasions from heterogeneous sources and associate them for circumstance location.
As Farris et al., (2016) opined that this proposed framework offers sense-and-reaction ability to a RFID-based healing facility, hence bringing about a speedier response. The framework is able to channel essential occasions and concentrate important data so as to recognize therapeutically critical occasions (Mandal et al., 2013). Fundamentally, this framework is an extra to the current RFID innovation and it concentrates for the most part on the product side as it were. The new item store network has been executing RFID broadly and it builds effectiveness primarily in stock. An exploration in Spain demonstrates that by adding RFID to an inventory network to give better esteem added administration to clients.
As Nguyen et al., (2012) demonstrated that dynamic RFID framework was added to improve a framework called MT. MT is an imaginative and biological, bundling and transport unit and it is utilized for the staple store network. Made by a Spanish organization, ECOMOVISTAND, the MT unit serves as a bundling to the maker, as a vehicle unit, as capacity to distribution center and as a showcase at the store stand (Canard et al., 2012). The framework utilizes a stateless outline where the middleware interfaces as web administration. The disadvantage of the framework is high execution cost because of dynamic RFID is utilized.
2.8 Suggestion of Optimal Components
The RFID-based general designing framework engineering is composed with four layers, in particular, physical layer, information catching layer, process layer, and application layer (Cremer et al., 2013). The usefulness of every layer will be talked about in subtle element for four unique applications to be specific, material passing framework, stakeholder participation framework, entire process administration framework, and mundane administration framework.
The physical layer traces the equipment segments used in the proposed framework. The equipment utilized incorporates Gen 2 EPC label, aloof RFID reader and connecting wire. This layer gives the front-end information catching framework. Every understudy RFID tag just stores exceptional electronic item code (Marino et al., 2013). The remarkable electronic item code is a record that encourages seeking understudy data in database. The understudy data that can be gotten in database incorporates all his scholarly related information in particular, understudy name, ID, age, staff, medical diagnosis records, evaluations of diseases, assessment record, prescribed medicine record and other medicinal record (Mehrjerdi, 2014).
The inactive RFID reader is proficient to recognize labels inside 2 to s3 m extend and works at 919-923 MHz. The information catching layer manages the correspondence amongst tag and reader (Alesii et al., 2015). This layer ensures that RFID labels can interface with the RFID framework that utilizations diverse information arrangement and gauges. The caught information is changed over into framework lucid information in this layer (Sim et al., 2015).
The application layer presents easy to understand graphical UIs to permit the understudies and staffs to utilize the application flawlessly in a Windows domain. An arrangement of standard application program interface (API) ensures heterogeneous applications and databases framework to collaborate with each other successfully (Occhiuzzi et al., 2013). A graphical UI (GUI) project is utilized to show the particular data on LCD screen to inform the client. The RFID framework composed is proficient to incorporate with the current standardized identification and HF programming applications. As Hui (2015) demonstrates the entrance control framework in address each unit in terms of access and operation.
2.9 Different Frequency Band Consideration and Review
RFID Systems Driven Concept Frequency band Specification Tag types Security protection System architecture Cost
Currently Proposed System Configuration Custom UHF RFID system with real time mode characteristic that increase operational efficiency and scalability in heterogeneous applications UHF Passive Lightweight cryptographic 4 layers
Physical
Data capturing
Process
Application Low
RFID Based People Management System Using UHF Tags (Joshi et al., 2014) Utilization of UHF antenna which makes the attendance recording system ubiquitous UHF Passive Not specified Not specified Not specified
Real-time location and inpatient care systems based on passive RFID (Kalansuriya et al., 2013) Provides backup data source from wristband and offline working mode using HF RFID HF Passive Not Specified 5 layers
Application
RFID Java Package wrapper Native driver
RFID reader/writer Low
Enhancing Construction Quality Inspection and Management Using RFID Technology (Casula et al., 2014) Information sharing platform that integrates QIM (quality inspection and management) with PDAs, web and RFID Not Specified Passive Not Specified 3 layers
Presentation
Application
Database
Low
Leveraging Complex Event Processing for Smart Construction Using RFID (Han et al., 2016) Utilization of CEP( Complex Event Processing) framework to model surgical events and critical situation Not Specified Passive Not Specified 2 layers
Physical
semantic Not Specified
Tracking of Returnable Packaging and Transport Units with active RFID in the grocery supply chain (Hessar & Roy, 2013) Turns packaging and transport unit into an intelligent product platform by embedding active RFID tags UHF (2.4 GHz ) Active Not Specified 3 frameworks RFID
middleware customer and control High
Table 2: Comparison of RFID Systems from Prior Studies
(Source: Kalansuriya et al., 2013; Casula et al., 2014; Han et al., 2016; Hessar & Roy, 2013)
2.10 Detailed Comparison In between Three Types of RFID Readers
UHF RFID framework has out-played out the shut circuit TV (CCTV) reconnaissance framework to screen the entrance control and keep up wellbeing at auto park range. UHF RFID framework offers constant access control at auto park framework without human mediation. In any case, CCTV observation framework is tried and true on human to watch and screen the auto park territory (Xia et al., 2012). Thus, security issues can be enhanced as any unapproved vehicle softening up the college premises is effectively checked. In this way, this framework ensures quick and secure vehicle access control and observing.
Property and Criteria HF RFID system Active RFID system Current Generation 2 UHF RFID system
Tag Reading rate of the Reader Lesser than 100 meters / 64 bits of memory Lesser than 1 meters / 128 bits of memory Lesser than 10 meters / 64 bits of memory
Tag reading range specification of the Reader Lesser than 1 meters Up to 2 kilometers Within 3 meters
Tags Read in Certain Second Maximum 50 tags per second Maximum 100 tags per second Maximum 100 tags per second
Per Tag Cost (In $) ≈$ 0.20 ≈$ 20 ≈$ 0.15
Table 3: Property Based Comparison of RFID Systems
(Source: Nguyen et al., 2012, pp. 133)
By actualizing UHF RFID innovation in the participation framework, the participation enrollment of understudies can be naturally overhauled in the database. The framework offers a solid constant following of understudies’ truancy. Thus, time for physically checking of participation amid class can be spared (Benbaghdad et al., 2012). Likewise, the paper based participation framework that adds to an Earth-wide temperature boost can be disposed of. The usage of UHF RFID in library empowers various labels to be perused all the while. UHF innovation is less inclined to mutilation mistake brought on by labels overlay each other in a heap of books if contrasted with HF innovation (Chen et al., 2014).
The quick perusing speed empowers the reader to retry read a misread tag various times. Consequently, library administration framework could rehearse the snappy racking of books to encourage the books stock (Gong et al., 2012). This permits lost books to be identified effectively utilizing convenient readers to clear the racks. The versatile pursuer can quickly recognize all books data inside the sought reach. Books can be specifically looked at in and checked by benefactors at the library self-administration registration and registration counter. The books exchange data is overhauled at the library stock framework quickly (Bueno-Delgado & Pavon-Marino, 2013).
A caution framework will be initiated by framework if the book ID distinguished is not put away in the database framework. UHF RFID-based social insurance unit offers a quicker and more productive medication stock framework than scanner tag and HF RFID based medication stock framework (Bendavid, 2013). The more UHF RFID reader location range trademark ensures a simpler checking process for following types of gear at medicinal services passage/exit territories. Social insurance administration framework utilizing UHF RFID innovation empowers health monitoring personnel and attendants to settle on quicker and more precise choices on patients’ drugs (Chen & Chou, 2015).
The holding up time of patients can be decreased essentially as patient data and medicinal history are recognized in a flash. This framework can avoid therapeutic mistakes and increment administration proficiency (Dubok & Smolders, 2014). The related works examined in this area are picked taking into account the likenesses of the examination with the proposed framework. The proposed framework is better than the others regarding information mystery insurance, lower execution cost, adaptable design layers, complying with Gen 2 gauges and relevance in more extensive territories.
2.11 Chapter Summary
This section is included for stating the primary points under a literature review part. The literature review is significantly important for summarizing the adjustable theoretical and prior researches in certain agenda. The agenda based study often assumed to have several viewpoints from the prior studies. However, some limitations stay in the literature review section, as the prior study limitations, their shortfalls in the agenda. For instance, some studies were conducted with limited view over the main perspective of research, therefore, the review of literature merely sort out the key findings in support to the current study. Moreover, the literature review section is another step to emphasize over the preliminary results from other studies. The key concern is identified as reviewing the studies to gain a detailed view of the shortcomings.
In short, the literature review section is an important part of any study, as it depicts related studies. From the related studies, the researcher can point out the future scopes. The scopes can be included in the current studies for making the current research a valuable piece of work as well. Therefore, the summary suggests the primary concern as implementation of point-to-point wireless link incorporation for RFID based medicine tracking system.
CHAPTER III: METHODOLOGY
3.1 Design and Method of the Study
The study design and method depicts the primary approach for conducting the study. The overall design and method incorporates a suitable research design and planning. The planning requires determining the timeline for completing the study. Timeline is required to obtain particular activities for researching and studying in detail for the agenda (Zhu et al., 2012). The agenda is identified as designing a wireless extension module for health monitoring with RFID technology incorporation. Moreover, the study is required to consider a certain domain of personnel and stakeholders for conducting the data collection process. Therefore, a certain sample is to be accounted in the study along with certain instrument for data analysis.
After collection of data and analysis, the data reliability and validation is a major concern in any study. Therefore, the further validation of data is to be conducted along with supportive databases, online sources, and authentic article consideration (Farris et al., 2013). The study should be conducted with some assumptions, limitations, and ethical considerations as well. Therefore, the assumed considerations are to be reflected on future scopes. The limitations are necessary for identifying the research goal, outline effectiveness, and missing points due to some limited adjustments. Moreover, the ethical considerations are demonstrated with handling the sample stakeholders in the study (Vera et al., 2014). The primary data collection technique is considered as qualitative and quantitative for identifying the individual opinions about the wireless RFID based material tracking process. The additional data collection is important for analyzing the information in terms of quantification of information along with research question. The question is identified as:
3.2 Instruments for Study
The research instrument is selected as primary and secondary study based on RFID technology and wireless extension incorporation in case of construction sectors. The study requires a detailed and empirical view over the wireless extensibility of RFID reader and tags in tracking or tracing of medicines and drugs (Nawaz et al., 2013). The study is designed with five requirements as elementary tasks in the furthermore study that indicates when the actual research will be conducted, these five requirements will be evaluated.
Therefore, briefing the primary considerations, the proposal would seek out the aim of the literature review part as identifying the primary functionality, wireless expendabilities, and interfacing process. Again, further parts of the literature review would seek out the comprehension about the long range low power wireless technologies. This section is important for suggesting optimal considerations for comparative wireless capabilities and study requirements. Moreover, in terms of meeting the other three requirements of the study, the researcher would consider two types of data collections as primary and secondary. The primary type would be conducted for realistic approach and opinions from the considered sample and secondary study would be conducted for preliminary studies gaining the prior results.
3.3 Wireless link between Reader and Laptop (Our System)
Figure 3.1: Block diagram of the wireless extension of the RFID-based IHM system.
The block diagram of the proposed wireless extension of the RFID-based IHM system is shown in Figure 3.1. This can be categorized as a point-to-point wireless link where two nodes (wireless transceivers in Figure 1) communicate between each other. The necessity of wireless transceiver (a) depends upon the wireless technology (e.g., Wi-Fi and GSM 3G/4G) to be selected for the wireless extension. Since modern laptop computers have built-in Wi-Fi transceivers, an extra device for (a) may not be necessary if Wi-Fi technology to be selected for the implementation. If external device for (a) is proposed it can be interfaced with the laptop computer using Ethernet or USB (universal serial bus). The RFID reader shown in the block diagram is a commercial UHF (ultra-high frequency) Generation 2 reader (Speedway Revolution 420) which complies with EPC Class 1 Generation 2 air interface protocol. The sensor-integrated RFID tag antenna to RFID reader data acquisition of the IHM system is within the maximum specified backscatter data rate of 640 kbits/s. The interfacing between possible device for wireless transceiver (b) and the RFID reader can be done via Ethernet or serial communication using available 10/100 Base-T Ethernet or RJ-45 Console ports in the reader, respectively. Even though the RFID-based IHM system operates within above mentioned maximum data rate up to RFID reader, the proposed wireless extension should support minimum data rate of 115200 kbits/s due to additional overheads of communication between data acquisition client application (runs in the laptop computer) and RFID reader. (Imping, EPC global 2016,2014)
3.4 Validation and Reliability
The collected study data and information should be checked for validity and reliability. This validation is essential for identifying the inconsistency in between the responses gathered (Kumar et al., 2015). Inconsistencies may occur due to various opinions from random population for the study. Therefore, these inconsistencies may turn out to be lacking in specific outcome identification from the study. Hence, the validation and reliability understanding process is essential for any study completion.
3.5 Assumptions
Study relatively considers some assumptions for depicting essential activities under the analysis. The assumptions obtain that research is limited to some aspects as the study is dependent over the respondents and the sample. The primary assumptions in the study are included in this aspect as following:
I. The responses are collected in the study, are genuine in the study. Therefore, the validity and reliability aspect is maintained in the study.
II. The respondents should cooperate with the study, to ensure this; the questionnaire should have a detailed purpose. Therefore, the respondents can engage their best knowledge about the agenda.
III. The secondary studies should be taken under study for empirical analysis over the topic and identified objectives.
3.6 Limitations of the Study
While directing the entire study and collecting lots of information from the sample and articles, the researcher faced several limitations and restrictions. Therefore, the imperatives and considered restrictions in the research may have a chance of being both preventable and non-preventable as per the nature. As Ullah et al., (2012) opined that, the restrictions in the explorative study characterize the constraint in the research scope and covered agenda. Primarily encountered limitations and constraints are identified as following:
Limited Budget and Expenditure Constraints: The researcher has considered a literature review over the different Generation 2 UHF RFID reader and RFID tags. The comprehensive study of literatures is included due to limited budget. In case, extra budget and expenditure is allocated, different RFID readers and RFID tagging can be conducted with practical aspects. Therefore, the study would have been more appropriate and authentic as per results obtainment. For detailed and practical opinions, the employees are to be enquired in this study.
Limited Time Constraints: The analyst has a limit of six to seven weeks time for conducting the entire study. Due to conducting study over some mentioned tasks, the researcher was bound to continue the study over the limited time considering them. The detailed analysis and study can be conducted over several aspects; however, the detailed study is avoided as the study is only focused over the wireless extensibility determination of the RFID tags and readers.
Dependability and Validity of Study Outcomes: The employees of construction sector should be involved under their personal choice. The population and sample should not be employed in the study under circumstances of any physical influence and pressure. The responses can be biased in nature, though the study is continued with shear validity checking and feasibleness assessment over the findings analysis. Some limitations may exist in the study regarding the reliability of the responses in the current aspect.
3.7 Ethical Considerations
For leading an explorative study along with a productive way, the researcher needs to consider different sets of accepted rules and moral contemplations (Alsalihy & Askar, 2013). The aspects of moral contemplations permitted the analyst to distinguish between the do and don’ts for the study approach required to lead an explorative study. For researching the reason for various RFID tags and reader considerations and approaches to counteract them, the researcher has taken after the accompanying contemplations to acquire standard in the research:
Respondents’ Involvement in the Study: During the data gathering process, the researcher has not engaged any influence for participating in the research. Moreover, the analyst has likewise guaranteed that the respondents are included with voluntary engagement from their end. The respondents have been considered for assessment of the findings. In this manner, the employees of construction sector have participated in the study with no acted upon influence.
Information and Data Application: The collected data and information in the study should be applied in a professional manner. Therefore, the data confidentiality and use of such data in other purpose can be minimized. The collected data should be included strictly under research and academic purpose in the study.
Respondents’ Anonymity: While directing the online study and interviews, the researcher has guaranteed that respondents should be kept anonymous. No identification and information of them should be disclosed under any circumstance.
3.8 Timeline of the Study
As per the allocated time for conducting the study and appointed specific time consideration, the research is segmented under primarily identified tasks and activities. For investigation of the Impinj Speedway Revolution 420/ version IPJ-REV-R420-GX32M, the researcher has adopted reviewing of literature in the study. As the study has a period restriction, the analyst has considered Gantt chart for finishing up all the undertaking activities inside provided time. Russo et al., (2013) referred that the utilization of Gantt chart has permitted the analyst to segment all the crucial activates that helps with the better fulfillment of the study.
Study Activities Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7
Identification of Final Research Topic
Discussion and Consideration of the Study Purpose
Identification of the Study Aims and Objectives
Identification of the Study Structure and Rationale
Identification and Demonstration of the Study Methodology
Review of the Several Prior Studies and Literatures
Identification of the Primary Points for Consideration
Documentation of the Related Studies under Draft
Method Outline and Design Selection Process
Feasible Approach Selection for Conducting the Study
Consideration of the Sample for Study
Questionnaire Distribution and Quantitative Findings Obtainment
Interview Sessions and Qualitative Data Collection Process
Analysis of the Collected Data
Preparation of the Findings and Discussion Section
Completion and Submission of the Final Draft
Table 4: Time Horizon of the Study
(Source: Created by author)
For systematic and suitable completion of several activities and sub-tasks, the researcher should engage use of Gantt chart. Therefore, the study can be properly addressed within limited timeline as specified.
3.9 Chapter Summary
The explorative design and deductive method depicts the primary approach for conducting the study. The data analysis process requires conducting study over considered sample and population as in primary and secondary as well. The collected data and information should be checked for validity and reliability. Primary study relatively considers some assumptions for depicting essential activities under the analysis. The responses are collected in the study are believed to be genuine in the study. The secondary studies should be taken under study for empirical analysis over the topic and identified objectives. Due to conducting study over some mentioned tasks, the researcher was bound to continue the study over the limited time considering them. The detailed analysis and study can be conducted over several aspects; however, the detailed study is avoided as the study is only focused over the wireless extensibility determination of the RFID tags and readers. The collected data should be included strictly under research and academic purpose in the study.
CHAPTER IV: SUMMARY AND RESEARCH PLAN
4.1 Conclusion
The aim of the proposal is to employ RFID with mountable RFID sensors, integrated UHF RFID tag, and generation 2 UHF RFID readers along with one particular system. In this scenario, the problem lies in facing higher cost and expenditure for buying several equipment and tracking modules. Therefore, apart from buying these modules, the construction sectors and patient monitoring process can be managed with implementing RFID monitoring system. Now the question is: How RFID technology can be incorporated in construction sector for monitoring relevant data tracking, tracing, and smarter inventory control?
Now, the nature of the study clearly states that this study should be empirical along with studying certain problem domains. To achieve suitable findings and analysis, the study employs an explorative approach. The outline of the study follows deductive method to summarize the findings as well. The study and proposal is primarily aimed at defining the functionality of Generation 2 UHF RFID reader, identifying the extensibilities, and interfacing properties. RFID sensor integration is dully important for enabling RFID technology for gathering inventory data and information. The proposal conducts linking between operational aspects of Generation 2 UHF RFID readers, their functionality, application, UHF RFID tags, and their operation for monitoring module design.
In short, aim of the proposal is to employ Radio-frequency identification (RFID) with mountable RFID sensors, integrated UHF RFID tag, and generation 2 UHF RFID readers along with computer. Nature of the study clearly states that this study should be empirical along with studying certain problem domains. The related studies can demonstrate the use of RFID technology in the construction sector. The secondary studies should be taken under study for empirical analysis over the topic and identified objectives. Again, the primary study process helps to gain practical view from the stakeholders. The RFID sensor integration is hugely important for enabling the RFID technology for gathering server data.
Based on such emerging technology ramifications, the current proposal depicts the related studies and relevant practice of RFID sensor, reader and tag based health monitoring system. Therefore, the proposal studies about generation 2 UHF RFID readers, their functionality, application, UHF RFID tags, their operation for monitoring module design.
4.2 Importance of Linking with Objectives
The success and realization of completion is followed with linking with objectives, the aligning with objectives is more important for gathering noticeable advancement in the study. Linking with objectives is essential for attaining highest detailing about meeting all requirements of the study. Therefore, the study can be conducted with suitable level of understanding about the topic and agenda. The process of study and research moreover concludes with a realization of objectives alignment. Concluding the study, along with objectives linking helps the researcher to assess about the research. Furthermore, the alignment with objectives is far more important as evaluation post implementation reviewing of the research.
Aligning with objectives requires including all the objectives in the conclusion section. The necessary discussion part and findings part is incorporated along with the objectives for identification of the particular objective achievement. Furthermore, the alignment of objectives may point out some limitations in certain aspects in the study. Sometimes, the alignment procedures help the researcher to identify the particular limitations in the study. In future research activities, those limitations might be eliminated for getting empirical analysis. On the other hand, some out-of-scope points can be identified with linking objectives section in the research.
4.3 Implications of Research
The primary implications of the research are identified from this proposal document as implementation of point-to-point wireless link using Wi-Fi wireless bridge. The implementation process requires some prior activities that can help in identifying the suitable components. The suitable components are identified as RFID tags, reader, and wireless technologies for optimal extensibility design. Therefore, to some extent, the literature reviewing is important in the study to identify some suitable prior studies in the process. The literature reviewing is primary implication of the study for depicting how other researchers have conducted the study, whether they had completed with suitable objectives or not. Again, the research methodology is another approach on how the study should be performed regarding all the tasks. Therefore, the data analysis is another implication considered as study outcome.
4.4 Identification of Recommendations and Requirements
Recommendations are identified as stating some suitable and best practices in the study to minimize some avoidable issues in the study. Requirement of recommendations is fundamental as this is related with limitations, future scopes, and proper practice procedure identification. Therefore, the final research process should be incorporated with recommending some suitable practices that certain organizations follow. The problem statement depicts that research is to be conducted with proper issue detection. The issue is then emphasized with study for demonstrating some preliminary studies and their challenges. Augmented purpose of the study is mainly centered with designing a wireless technology with RFID identification process for several materials and medicines.
Now, the implementation process may have some certain limitations, shortcomings, shortfalls, bottlenecks, and limitations as well. In some cases, the implementation process can be performed in entirely another process; hence, the recommendations are important to provide a general note to the organization. The organization should follow the optimal suggestions as per the findings in the study; therefore, the organization may have the benefits from the research outcomes. The requirements of such recommendations are often preferred as showing proper and suitable utilization of study outcomes. The study can be a helpful tool for better practice in organizations.
4.5 Realization of Study Future Scopes
Future scopes are identified generally in case of realizing how the study can be extended furthermore keeping all the initiatives intact within. Clearly, the research activities take much time rather than conducting normal analysis of data points, report, synopsis making, and discussions. The research activities are significantly detailed with including some objectives for consideration of hypotheses. The hypothetical initiatives are essential for analysis process aligned with significant proof on a particular agenda. Now in the process detailed study, scheduling is necessary to cover all the requirements, however, there may be some exclusion in the study for completing it within time. As some parts are excluded from the study, hence, the study can be conducted in future considering them. These excluded parts are identified as future scopes and these parts are crucial for continuing the entire study. In the final research activity, future scope identification is vital for expansion of research work.
4.6 Realization of Study Limitations
The limitations and study scope should be realized as limitations are identified due to completion of the study within shorter timeline. Some parts of the study is took out of the structure for timely completion. The imperatives and considered restrictions in the research may have a chance of being both preventable and non-preventable as per the nature. The restrictions in the explorative study characterize the constraint in the research scope and covered agenda.
The researcher has considered a literature review over the different Generation 2 UHF RFID reader and RFID tags. The comprehensive study of literatures is included due to limited budget. In case, extra budget and expenditure is allocated, different RFID readers and RFID tagging can be conducted with practical aspects. Therefore, the study would have been more appropriate and authentic as per results obtainment. For detailed and practical opinions, the employees are to be enquired in this study.
The analyst has a limit of six to seven weeks’ time for conducting the entire study. Due to conducting study over some mentioned tasks, the researcher was bound to continue the study over the limited time considering them. The detailed analysis and study can be conducted over several aspects; however, the detailed study is avoided as the study is only focused over the wireless extensibility determination of the RFID tags and readers.
The employees of construction sector should be involved under their personal choice. The population and sample should not be employed in the study under circumstances of any physical influence and pressure. The responses can be biased in nature, though the study is continued with shear validity checking and feasibleness assessment over the findings analysis. Some limitations may exist in the study regarding the reliability of the responses in the current aspect.
REFERENCES
Abad, I., Cerrada, C., Cerrada, J., Heradio, R. and Valero, E. (2012) "Managing RFID Sensors Networks with a General Purpose RFID Middleware", Sensors, 12(12), pp. 7719-7737.
Abdulhadi, A. and Abhari, R. (2016) "Multiport UHF RFID-Tag Antenna for Enhanced Energy Harvesting of Self-Powered Wireless Sensors", IEEE Transactions on Industrial Informatics, 12(2), pp. 801-808.
Alesii, R., Di Marco, P., Santucci, F., Savazzi, P., Valentini, R. and Vizziello, A. (2015) “Multi-reader multi-tag architecture for UWB/UHF radio frequency identification systems”, In RFID Technology (EURFID), 2015 International EURASIP Workshop on (pp. 28-35). IEEE.
Alsalihy, W.A.A. and Askar, N.A. (2013) “Enhancement of redundant reader elimination by using hybrid algorithm in RFID systems”, Wireless personal communications, 72(2), pp.1139-1156.
Bai, Y.B., Wu, S., Wu, H.R. and Zhang, K. (2012) “Overview of RFID-Based Indoor Positioning Technology”, In GSR.
Benbaghdad, M., Metref, A. and Fergani, B. (2012) “Dual Antenna for Physical layer UHF RFID collision cancelling”, In Multimedia Computing and Systems (ICMCS), 2012 International Conference on (pp. 623-628). IEEE.
Bendavid, Y. (2013) “RFID-enabled Real-Time Location System (RTLS) to improve hospital's operations management: An up-to-date typology”, International Journal of RF Technologies, 5(3-4), pp.137-158.
Boyer, C. and Roy, S. (2012) “Coded QAM backscatter modulation for RFID”, IEEE Transactions on Communications, 60(7), pp.1925-1934.
Bueno-Delgado, M.V. and Pavon-Marino, P. (2013) “A centralized and aligned scheduler for passive RFID dense reader environments working under EPCglobal standard”, Simulation Modelling Practice and Theory, 34, pp.172-185.
Canard, S., Ferreira, L. and Robshaw, M. (2012) “Improved (and practical) public-key authentication for UHF RFID tags”, In International Conference on Smart Card Research and Advanced Applications (pp. 46-61). Springer Berlin Heidelberg.
Casula, G., Montisci, G. and Mazzarella, G. (2013) "A Wideband PET Inkjet-Printed Antenna for UHF RFID", Antennas Wirel. Propag. Lett., 12, pp. 1400-1403.
Casula, G.A., Montisci, G., Maxia, P. and Mazzarella, G. (2014) “A narrowband chipless multiresonator tag for UHF RFID”, Journal of Electromagnetic Waves and Applications, 28(2), pp.214-227.
Catarinucci, L., De Donno, D., Colella, R., Ricciato, F. and Tarricone, L. (2012) "A Cost-Effective SDR Platform for Performance Characterization of RFID Tags", IEEE Trans. Instrum. Meas., 61(4), pp. 903-911.
Chen, C.L., Huang, Y.C. and Shih, T.F. (2012) “A novel mutual authentication scheme for RFID conforming EPCglobal class 1 generation 2 standards”, Information Technology And Control, 41(3), pp.220-228.
Chen, H., Zhu, Y., Ma, L. and Niu, B. (2014) “Multiobjective RFID network optimization using multiobjective evolutionary and swarm intelligence approaches”, Mathematical Problems in Engineering (2014)
Chen, M., Luo, W., Mo, Z., Chen, S. and Fang, Y. (2016) “An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel”, IEEE/ACM Transactions on Networking, 24(2), pp.703-716.
Chen, W. (2014) "A Feasible and Easy-to-Implement Anticollision Algorithm for the EPCglobal UHF Class-1 Generation-2 RFID Protocol", IEEE Transactions on Automation Science and Engineering, 11(2), pp. 485-491.
Chen, Y. and Chou, J.S. (2015) “ECC-based untraceable authentication for large-scale active-tag RFID systems”, Electronic Commerce Research, 15(1), pp.97-120.
Colella, R., Catarinucci, L., Coppola, P. and Tarricone, L. (2016) “Measurement platform for electromagnetic characterization and performance evaluation of UHF RFID tags”, IEEE Transactions on Instrumentation and Measurement, 65(4), pp.905-914.
Cremer, M., Pervez, A., Dettmar, U., Knie, T. and Kronberger, R. (2013) “An improved channel model for passive UHF RFID systems”, InRFID-Technologies and Applications (RFID-TA), 2013 IEEE International Conference on (pp. 1-7). IEEE.
De Donno, D., Catarinucci, L. and Tarricone, L. (2014) "A Battery-Assisted Sensor-Enhanced RFID Tag Enabling Heterogeneous Wireless Sensor Networks", IEEE Sensors J., 14(4), pp. 1048-1055.
De Donno, D., Tarricone, L., Catarinucci, L., Lakafosis, V. and Tentzeris, M. (2012) "PERFORMANCE ENHANCEMENT OF THE RFID EPC GEN2 PROTOCOL BY EXPLOITING COLLISION RECOVERY", Progress In Electromagnetics Research B, 43, pp. 53-72.
Deyle, T., Reynolds, M.S. and Kemp, C.C. (2014) “Finding and navigating to household objects with uhf rfid tags by optimizing rf signal strength”, In 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems (pp. 2579-2586). IEEE.
Dubok, A. and Smolders, A.B. (2014) “Miniaturization of robust UHF RFID antennas for use on perishable goods and human bodies”, IEEE Antennas and Wireless Propagation Letters, 13, pp.1321-1324.
Duroc, Y. and Vera, G.A. (2014) “Towards autonomous wireless sensors: RFID and energy harvesting solutions”, In Internet of Things (pp. 233-255). Springer International Publishing.
EPCglobal Inc., (2005). EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communication at 860 MHz - 960 MHz Version 1.0.9. accessed: March 10, 2014.
Farris, I., Iera, A. and Spinella, S.C. (2013) “Using the RFID technology to create a low-cost communication channel for data exchange”, In ITU Kaleidoscope: Building Sustainable Communities (K-2013), 2013 Proceedings of (pp. 1-8). IEEE.
Farris, I., Militano, L., Iera, A., Molinaro, A. and Spinella, S.C. (2016) “Tag-based cooperative data gathering and energy recharging in wide area RFID sensor networks”, Ad Hoc Networks, 36, pp.214-228.
Geng, L., Bugallo, M.F., Athalye, A. and Djurić, P.M. (2014) “Indoor tracking with RFID systems”, IEEE Journal of Selected Topics in Signal Processing,8(1), pp.96-105.
Girbau, D., Ramos, A., Lazaro, A., Rima, S. and Villarino, R. (2012) "Passive Wireless Temperature Sensor Based on Time-Coded UWB Chipless RFID Tags", IEEE Transactions on Microwave Theory and Techniques, 60(11), pp. 3623-3632.
Gong, Y.J., Shen, M., Zhang, J., Kaynak, O., Chen, W.N. and Zhan, Z.H. (2012) “Optimizing RFID network planning by using a particle swarm optimization algorithm with redundant reader elimination”, IEEE Transactions on Industrial Informatics, 8(4), pp.900-912.
Han, J., Qian, C., Yang, P., Ma, D., Jiang, Z., Xi, W. and Zhao, J. (2016) “Geneprint: generic and accurate physical-layer identification for UHF RFID tags”, IEEE/ACM Transactions on Networking, 24(2), pp.846-858.
Hessar, F. and Roy, S. (2013) “Energy based performance evaluation of passive epc gen 2 class 1 rfid systems”, IEEE Transactions on Communications, 61(4), pp.1337-1348.
Hui, C.P. (2015) “RFID-based location tracking system using a peer-to-peer network architecture” (Doctoral dissertation, The Hong Kong Polytechnic University).
IEEE transaction on instrumentation and measurement, vol. 65, No. 5, May 2016.
Impinj. Speedway Readers. Available: https://support.impinj.com/hc/en-us/articles/202755388-Speedway-Reader-Product-Brief-Datasheet, accessed: September 20, 2016.
Impinj. SpeedwayR installation and operations guide version 5.6.2. Available: https://support.impinj.com/hc/en-us/articles/202755298-Reader-Documentation, accessed: September 20, 2016.
Jayawardana, D., S. Kharkovsky, R. Liyanapathirana, and X. Zhu, “Measurement system with accelerometer integrated RFID tag for infrastructure health monitoring,” IEEE Transactions on Instrumentation and Measurement, vol. 65, no. 5, pp. 1163-1171, 2016.
Joshi, G.P., Acharya, S., Kim, C.S., Kim, B.S. and Kim, S.W. (2014) “Smart solutions in elderly care facilities with RFID system and its integration with wireless sensor networks”, International Journal of Distributed Sensor Networks (2014)
Kalansuriya, P., Bhattacharyya, R. and Sarma, S. (2013) “RFID tag antenna-based sensing for pervasive surface crack detection”, IEEE Sensors Journal,13(5), pp.1564-1570.
Khor, J., Ismail, W., Kamarulazizi, K. and Rahman, M.G. (2012) EPC Class-1 Generation-2 radio frequency Identification (RFID)-based Malaysian University Communities. Scientific Research and Essays, 7(8), pp.852-864.
Koswatta, R. and Karmakar, N. (2012) "A Novel Reader Architecture Based on UWB Chirp Signal Interrogation for Multiresonator-Based Chipless RFID Tag Reading", IEEE Transactions on Microwave Theory and Techniques, 60(9), pp. 2925-2933.
Kumar, N., Kaur, K., Misra, S.C. and Iqbal, R. (2015) “An intelligent RFID-enabled authentication scheme for construction applications in vehicular mobile cloud”, Peer-to-Peer Networking and Applications, pp.1-17.
Kumari, L., Narsaiah, K., Grewal, M.K. and Anurag, R.K. (2015) “Application of RFID in agri-food sector”, Trends in Food Science & Technology, 43(2), pp.144-161.
Mandal, K., Fan, X. and Gong, G. (2013) “Warbler: A lightweight pseudorandom number generator for EPC C1 Gen2 passive RFID tags”, Int. J. RFID Secur. Cryptogr, 2, pp.82-91.
Marino, F., Massei, G. and Paura, L. (2013) “Modeling and performance simulation of EPC Gen2 RFID on OPNET”, In Measurements and Networking Proceedings (M&N), 2013 IEEE International Workshop on(pp. 83-88). IEEE.
Massawe, L.V., Vermaak, H. and Kinyua, J.D. (2012) “An adaptive data cleaning scheme for reducing false negative reads in RFID data streams”, In2012 IEEE International Conference on RFID (RFID) (pp. 157-164). IEEE.
Mehrjerdi, Y.Z. (2014) “RFID: A Bibliographical Literature Review with Future Research Directions”, International Journal of Industrial Engineering, 25(2), pp.151-190.
Metzger, C., Thiesse, F., Gershwin, S. and Fleisch, E. (2013) "The impact of false-negative reads on the performance of RFID-based shelf inventory control policies", Computers & Operations Research, 40(7), pp. 1864-1873.
Nawaz, F., Jeoti, V., Awang, A. and Drieberg, M. (2013) “Reader to reader anticollision protocols in dense and passive RFID environment”, InCommunications (MICC), 2013 IEEE Malaysia International Conference on(pp. 468-473). IEEE.
Nguyen, D.S., Le, X.C., Pham, T.T., Nguyen, V.H., Dang, M.C. and Tedjini, S. (2012) “Novel design of RFID UHF passive tag for wideband applications by direct and contactless chip connection”, In RFID-Technologies and Applications (RFID-TA), 2012 IEEE International Conference on (pp. 131-136). IEEE.
Occhiuzzi, C., Caizzone, S. and Marrocco, G. (2013) "Passive UHF RFID antennas for sensing applications: Principles, methods, and classifcations", IEEE Antennas and Propagation Magazine, 55(6), pp. 14-34.
Occhiuzzi, C., Caizzone, S. and Marrocco, G. (2013) “Wireless sensing of things by passive RFID technology”, Europe, 866(869), pp.3-2.
Papapostolou, A. and Chaouchi, H. (2012) “Integrating RFID and WLAN for indoor positioning and IP movement detection”, Wireless Networks, 18(7), pp.861-879.
Perret, E., Tedjini, S. and Nair, R. (2012) "Design of Antennas for UHF RFID Tags", Proceedings of the IEEE, 100(7), pp. 2330-2340.
Rodriguez-Rodriguez, J., Delgado-Restituto, M., Masuch, J., Rodriguez-Perez, A., Alarcon, E. and Rodriguez-Vazquez, A. (2012) "An Ultralow-Power Mixed-Signal Back End for Passive Sensor UHF RFID Transponders", IEEE Trans. Ind. Electron., 59(2), pp. 1310-1322.
Russo, M., Šolić, P. and Stella, M. (2013) "Probabilistic modeling of harvested GSM energy and its application in extending UHF RFID tags reading range", Journal of Electromagnetic Waves and Applications, 27(4), pp. 473-484.
Safkhani, M., Bagheri, N., Peris-Lopez, P., Mitrokotsa, A. and Hernandez-Castro, J.C. (2012) “Weaknesses in another Gen2-based RFID authentication protocol”, In RFID-Technologies and Applications (RFID-TA), 2012 IEEE International Conference on (pp. 80-84). IEEE.
Sim, C.Y.D., Chen, C.C., Cao, R. and Chen, B.S. (2015) “A circular patch antenna with parasitic element for UHF RFID applications”, International Journal of RF and Microwave Computer‐Aided Engineering, 25(8), pp.681-687.
Ullah, S., Alsalih, W., Alsehaim, A. and Alsadhan, N. (2012) "A Review of Tags Anti-collision and Localization Protocols in RFID Networks", J Med Syst, 36(6), pp. 4037-4050.
Vera, G.A., Duroc, Y. and Tedjini, S. (2014) “Tag-to-reader harmonic link in passive UHF RFID”, In 2014 IEEE MTT-S International Microwave Symposium (IMS2014) (pp. 1-4). IEEE.
www.btgtecnologie.com (2016) "Speedway RFID Reader Products: Superior Performance Made Easy", www.btgtecnologie.com, [online] Available from: http://www.btgtecnologie.com/btg/uploads/2014/06/IPJ_Speedway_Brochure_20121108.pdf (Accessed 7 September 2016).
www.support.impinj.com (2016) "Impinj: Speedway Readers Superior RAIN REID Performance Made Easy", support.impinj.com, [online] Available from: https://support.impinj.com/hc/.../Impinj_SpeedwayReaders_ProductBrief_080715.pdf (Accessed 7 September 2016).
Xia, H., Wu, J., Xiao, B., Zan, X. and Wang, G. (2012) “Design of UHF RFID reader and the solution of crosstalk problems”, In Computational Problem-Solving (ICCP), 2012 International Conference on (pp. 212-217). IEEE.
Zhu, X., Mukhopadhyay, S. and Kurata, H. (2012) "A review of RFID technology and its managerial applications in different industries", Journal of Engineering and Technology Management, 29(1), pp. 152-167.