Designing and Deploying RFID Applications Part 1 pptx

30 408 0
Designing and Deploying RFID Applications Part 1 pptx

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

DESIGNINGAND DEPLOYINGRFID APPLICATIONS  EditedbyCristinaTurcu              Designing and Deploying RFID Applications Edited by Cristina Turcu Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2011 InTech All chapters are Open Access articles distributed under the Creative Commons Non Commercial Share Alike Attribution 3.0 license, which permits to copy, distribute, transmit, and adapt the work in any medium, so long as the original work is properly cited. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work. Any republication, referencing or personal use of the work must explicitly identify the original source. Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published articles. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book. Publishing Process Manager Davor Vidic Technical Editor Teodora Smiljanic Cover Designer Martina Sirotic Image Copyright Albert Lozano, 2010. Used under license from Shutterstock.com First published August, 2011 Printed in Croatia A free online edition of this book is available at www.intechopen.com Additional hard copies can be obtained from orders@intechweb.org Designing and Deploying RFID Applications, Edited by Cristina Turcu p. cm. ISBN 978-953-307-265-4 free online editions of InTech Books and Journals can be found at www.intechopen.com   Contents  Preface IX Chapter 1 Impacts of RFID on Business Models 1 Ela Sibel Bayrak Meydanoğlu Chapter 2 Commercial and Implementation Issues Relating to the Widespread Acceptance and Adoption of Radio Frequency Identification Technology 11 Mark J. Rodrigues and Kieran James Chapter 3 The Role of RFID Technology in Supply Chain Risk Management 23 May Tajima Chapter 4 Secure RFID for Humanitarian Logistics 41 Gianmarco Baldini, Franco Oliveri, Hermann Seuschek, Erwin Hess and Michael Braun Chapter 5 Applications of RFID Technology in the Complex Product Assembly Executive Process 59 Huibin Sun Chapter 6 Using RFID Technology for Simplification of Retail Processes 77 Azra Bayraktar, Erdal Yılmaz and Şakir Erdem Chapter 7 A Solution with Security Concern for RFID-Based Track & Trace Services in EPCglobal-Enabled Supply 95 Wei He, Yingjiu Li, Kevin Chiew, Tieyan Li and Eng Wah Lee Chapter 8 Discovery Services in the EPC Network 109 Martin Lorenz, Jürgen Müller, Matthieu-P. Schapranow, Alexander Zeier and Hasso Plattner VI Contents Chapter 9 Advantages and New Applications of DHT-Based Discovery Services in EPCglobal Network 131 Juan Pedro Muñoz-Gea, Pilar Manzanares-Lopez and Josemaria Malgosa-Sanahuja Chapter 10 Application of RFID and Mobile Technology to Plaster Board Waste in the Construction Industry 157 Lizong Zhang, Anthony S. Atkins and Hongnian Yu Chapter 11 RFID-Based Equipment Monitoring System 175 Mohd Helmy Abd Wahab, Herdawatie Abdul Kadir, Zarina Tukiran, Nor’aisah Sudin, Mohd Hafiz A. Jalil and Ayob Johari Chapter 12 Developing RFID-Based Instruments Maintenance Management in Construction Lab 189 Yu-Cheng Lin, Weng-Fong Cheung, Yi-Chuan Hsieh, Fu-Cih Siao and Yu-Chih Su Chapter 13 What are Authentic Pharmaceuticals Worth? 203 Matthieu Schapranow, Jürgen Müller, Martin Lorenz, Alexander Zeier and Hasso Plattner Chapter 14 Security Control and Privacy Preservation in RFID enabled Wine Supply Chain 221 Manmeet Mahinderjit-Singh, Xue LI and Zhanhuai LI Chapter 15 An RFID-Based Anti-Counterfeiting Track and Trace Solution 251 Ioan Ungurean, Cornel Turcu, Vasile Gaitan and Valentin Popa Chapter 16 A Knowledge-Based Approach for Detecting Misuses in RFID Systems 267 Gennaro Della Vecchia and Massimo Esposito Chapter 17 A Study on Implementation and Service of Digital Watermark Technology Architecture for Distribution Management 289 Manabu Hirakawa Chapter 18 RFID Middleware Design and Architecture 305 Mehdia Ajana El Khadda, Mohammed Boulmalf, Hamid Harroud and Mohammed Elkoutbi Chapter 19 A Study on the Influence of RFID Tagging on Circulation Services and Collection Management: a Case Study of the Taipei Public Library 327 Shu-hsien Tseng and Chien-ju Chou Contents VII Chapter 20 The Right UHF RFID Tags for Libraries – Criteria, Concern and Issues 345 Steve H Ching, Alice Tai, Henry Ip, Lau Lap Fai and Michael Cheng Chapter 21 RFID- Application in Info-Documentary Systems 363 Angela Repanovici and Luciana Cristea  Preface  Radio Frequency Identification (RFID), a method of remotely storing and receiving data using devices called RFID tags,  brings many real business benefits to today worldʹs organizations.Itexertsamajorinfluence indifferentlifeareaslikeinventory tracking, modern supply chain management, automated manufacturing, healthcare, etc. The benefits are multiple and inclu de expedited data capture/lead retrieval, accurate and trusted data, reduced cost, time and work processes, increased speed, productivityandbusinessefficiency,improvedsecurity,etc. Today, there are many companies offering RFID hardware, RFID tags, or dedicated solutionsforboth. It isajointeffortofresearchers andscientiststoenablecustomers from different areas to deploy high performance solutions by understanding their demands.Thesedemandsareconvertedintoinnovativeproductswhicharedelivered asviableandreliablesolutions,atcompetitiveprices. Over the years, RFID research has resulted in many concrete achievements and also contributedtothecreationofcommunitiestha tbringscientistsandengineerstogether withusers. This book includesvaluableresearchstudiesoftheexperiencedscientists inthefieldofRFID,includingmostrecentdevelopments. Chapter 1 aims at illustratingand clarifyingthe impact of RFID on business models, anessentialfactforcompaniestocreateabusinessvaluebyusingRFIDtechnologyin ordertogaincompetitiveadvantage. Chapter 2 examines the perceptions of RFID among Australian RFID suppliers/integrators,andtheroleandimportancethatperceptionsplayintheactual adoptionprocess.Theauthors’interview‐basedresearchstudyshowsthatintegrators’ perceptionscanaffecttheadoptionprocess.Thus,integ ratorperceptionscanactupon presentexpectationsofRFIDtechnology. Chapter 3 deals with the role of RFID technology in supply chain risk management. This research shows that RFID technology holds great promiseformanaging supply disruptions and for containing their harmful ripple effects. Also, a review of the literature is co nducted to identify specific risks associated with RFID’s capability to provide supply chain visibility. The research goes on to examine the existing X Preface mitigation approaches for dealing with RFID’s visibility‐related risks. Finally, the managementimplicationsofRFIDuseinsupplychainriskmanagement areoutlined, basedonbothadvantagesandrisks. Chapter4describesthemainfeaturesandchallengesofhumanitarianlogistics,along with the role of RFID technology in disaster supply chains and the implementation andd eploymentofsecureRFID. Chapter5introd uces twotypicalapplicationcasesofRFIDtechnologyintheexecutive process of complex product assembly. The first one solves the asynchrony problem between the logistics stream and the information stream in the executive process of complex product assembly. The second one address es the guidance of the on‐spot assemblyoperation,andachievesdynamicmatchingmechanismbetween3Dmodels and real‐size counter parts. Both these cases are discussed from methodology and implementation. They illustrate the potential of applying RFID technology in enhancing the controlling and monitoring methods of the executive process of complexproductassembly. The broad objective of chapter 6 is to show how RFID technology can be used to simplify the retail processes. The major aim of the considered study is to create a simpleRFID‐based processmodelfor retailers.Also,theauthorspresentacasestudy ofTurkishretailindu stry. In chapter 7 the authors analyze and discuss the technology and issues on RFID applications in supply chains for track & trace services, such as item identification, event capture and management, information storage and sharing among all participants in a supply chain. Also, they introduce an RFID‐based track & trace solutionwithsecurityconcernsinsupplychainsbasedonEPCglobalstandards. In chapter 8, the authorsexaminecloselythe discovery services in the EPC network. EPCglobal provides an infrastructure to increase visibility and efficiency throughout the supply chain as well as to guarantee higher quality information flow between companiesandtheirtradingp artners.Thepresentchaptershowsrealworldus ecases thatrequireadiscoveryservice.Furthermor e,theauthorsderivefunctionalaswellas non‐functional requirements from these use cases. They also discuss the implications oftheserequirementsregardingpossiblediscoveryservicedesigns. In chapter 9 th e authors analyze the advantages of implementing the Discovery Services (DS) component of the EPCglobal Network architecture using a Distributed Hash Table (DHT) application. Moreover, they demonstrate the possibility of developingnewapplicationsovertheDHT‐baseddiscoveryservices. Thecurrentplasterboarddisposalsituationwasintroducedinchapter10andalso,the logistic problem, a barrier to an increased recycling rate, was addressed in the same context.Aprototypesystemforwastemanagementwasoutlined. [...]... 2008 (AIM RFID Connections, 2003) Recent research from IDTechEx reports that ‘the next 10 years will see a rapid gain in market share of mainstream printed 16 Designing and Deploying RFID Applications and chipless RFID tags, and that the numbers sold globally will rise from 40 million in 2009 to 624 billion in 2 019 (Das and Harrop, 2 010 ) ABI Research sees continuing strong growth potential in RFID markets... their consequences’ (Thomas and Znaniecki, 19 27, p.8, cited in Rogers, 19 95, p.209) This project also examines how integrators’ perceptions can act upon present expectations of RFID technology An understanding of what leading integrators think at this moment may benefit vendors and others to create applications that will eventually secure more 12 Designing and Deploying RFID Applications widespread acceptance... Üstündağ, A (2008) RFID ve Tedarik Zinciri, Sistem Yayıncılık, ISBN 978-975-322- 515 -1, İstanbul Weber, T (2003) The Future of Shopping, BBC News Article, 04. 01. 2 011 , Available from http://news.bbc.co.uk/2/hi/business/3 712 2 61. stm 2 Commercial and Implementation Issues Relating to the Widespread Acceptance and Adoption of Radio Frequency Identification Technology 1Master Mark J Rodrigues1 and Kieran James2... deployment of RFID tags from 2005 to 2 015 (Raafat et al., 2007) In an environment, in which the use of RFID increases rapidly, companies have to use RFID in order to outmatch and not to lose market share Year Kategories in which tags are used Item Pallet/Case Other All Kategories Total 2005 2 010 2 015 0.5 0.4 0.4 1. 3 27.0 30.0 5.7 62.7 1, 000.0 35.0 12 .5 1, 047.5 Table 4 Forecast for global sales of RFID tags... Systems, 2003) 8 • Designing and Deploying RFID Applications As mentioned above RFID enhances transaction efficiency that gives rise also to cost reductions For example, automation of some processes (e.g checkouts, incoming goods control) via RFID causes a reduction both at labor costs and costs that incur to rectify errors caused by manual execution (Erickson and Kelly, 2007) 6.4 RFID and value creation... by RFID: 6 • • • Designing and Deploying RFID Applications Through creating a new way of conducting economic transactions among trading partners: RFID enables to form new strategic networks such as buyer-supplier partnerships, pay-per-use business models As RFID used in these networks provides various advantages (e.g cost reduction, superior customer service level) for companies, they want to be a partner... Despite this declaration it seems that the rapid deployment of RFID cannot be prevented, because both technical and regulative countermeasures are available to protect data privacy 8 References Betz, F (2002) Strategic Business Models, Engineering Management Journal, Vol 14 , No 1, (March, 2002), pp 21- 27 10 Designing and Deploying RFID Applications Bohn, J., Coroamă, V., Langheinrich, M., Mattern,... Standards and Technology (NIST), NIST Special Publication 800-98, Computer Security Division Information Technology Laboratory National Institute of Standards and Technology, Gaithersburg Kavas, A (2007): Radyo Frekans Tanımlama Sistemleri, Elektrik Mühendisliği Dergisi, Sayı 430, (Nisan, 2007), pp 74-80 Kış, M (2006) RFID nin Geleceği, 21. 01. 2 011 , Available from http://kodveus.blogspot.com/2006/05/rfidnin-gelecei.html... Using RFID in Supply Chain Management for Customer Service, Proceedings of 2006 IEEE International Conference on Systems, Man and Cybernetics, pp 13 77 -13 81, ISBN: 1- 4244-0099-6, Tapei, Taiwan, October 8 -11 , 2006 Osterwalder, A.; Pigneur, Y & Tucci, C L (2005) Clarifying Business Models: Origins, Present, and Future of the Concept, Communications of the Association for Information Systems (CAIS), Vol 15 ,... (2002, p.6 91) where they state that ‘[t]echnology exists and the company is trying to use it In doing so, the company may find 14 Designing and Deploying RFID Applications problems that no one knew existed’ When this occurs people may modify or stop using the technology Rogers (19 95, p.320) explains that, just as critical mass is added quickly, it can also rapidly fall away as people abandon an innovation . DESIGNING AND DEPLOYING RFID APPLICATIONS  EditedbyCristinaTurcu              Designing and Deploying RFID Applications Edited by Cristina. Alexander Zeier and Hasso Plattner Chapter 14 Security Control and Privacy Preservation in RFID enabled Wine Supply Chain 2 21 Manmeet Mahinderjit-Singh, Xue LI and Zhanhuai LI Chapter 15 An RFID- Based. value can be proposed by RFID: Designing and Deploying RFID Applications 6 • Through creating a new way of conducting economic transactions among trading partners: RFID enables to form new

Ngày đăng: 19/06/2014, 19:20

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan