A contrast approach for the usage of RFIDtechnology in ubiquitous environments
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar class
Active In SP

Posts: 5,361
Joined: Feb 2011
22-02-2011, 12:45 PM

A contrast approach for the usage of RFIDtechnology in ubiquitous environments

This report is based on the two reference papers that were published earlier. Thefirst reference paper[1] is “ Customer Self-Service in the hybrid library” published byInternational Network of Public Libraries Bertelsmann Foundation, Gütersloh, Germanyin 2002.In the first reference paper the authors basically explored the art of the selfservicein the international libraries. How ever I only refer to the part of this paper,especially advantages with the usage of the RFID technology in the hybrid librariescompared to the other technologies. The second reference paper [2] is “Issues with RFIDUsage in Ubiquitous Computing Applications”, which is part of the Pervasive 2004conference proceedings. In this paper various sources of errors in the passive RFIDsystems and the solutions to overcome these failures are discussed. To illustrate thefailures with RFID systems the authors augmented RFID tags in the playing cards andmeasured the performance of the RFID system during different stages of the game. I callthis report as “a contrast approach for the usage of the RFID technology in the ubiquitousenvironments” as it refers to the success and the failures with the RFID technology in theubiquitous environment. At the end of this report the two approaches used in both papersare compared to draw the conclusions.
In the recent years technology has been greatly integrated in the environments toprovide useful services to the humans in their everyday lives. For this purpose differenttechnologies like Barcode and RFID are introduced earlier. However the importance ofthe RFID technology has been increasing due to the fact that it has lot of advantages overthe other technologies. Lot of experiments has been conducted earlier to show thebenefits of the RFID technology in ubiquitous environments. Examples of theseexperiments include Magic Medicine Cabinet by Wan [3], the augmentation of desktopitems by Want et al. [4] and smart shelves by Decker et al. [5].In all the above statedexperiments passive RFID tags are used due to the fact that they are more cost effective.To illustrate the advantages and the benefits that are associated with passive RFIDtechnology I have used the statistical data that is given in the first reference paper“Customer Self-Service in the hybrid library”. However in case of the multi tag detectionthere are lot failures that are associated with the passive RFID tags. To illustrate theseproblems I referred to the second paper “Issues with RFID Usage in UbiquitousComputing Applications”. This report is arranged as follows: the first section gives anintroduction to the RFID system and its components, in the second section differentadvantages with the RFID technology are discussed in reference to the first article, in thethird section the failures with RFID technology are discussed in reference to the secondarticle and in conclusion the I compared the approaches used in both the reference papers.
RFID System components:
The RFID tag or the Transponder which is located on the object to be identifiedand it acts as the data carrier of the RFID system.The RFID reader OR Transceiver, which reads and writes the data from the tagdepending on the usage. And The middle wear or data processing sub system which stores and uses the data that is obtained from the RFID reader.
RFID tag: There are different types of RFID tags that are available in the marketdepending on their usage and functionality. However as shown in the figure 2 each RFID tag consists of the following basic components:There are two types of RFID tags.
They are: - Active RFID tags – Passive RFID tags.The basic difference between these tags lies in the way they function. Inthe active tags the power is generated internally by the battery and in the passive tags thepower is generated by the reader. The following tables describe the differences in bothtechnical and functional aspects of these tags.

download full report

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar onvoice usage mobile charging, papers on usage of mobile in restricted area, gsmcommmain usage, general usage of wireless dc motor, usage of multiply accumulate unit in dsp, kb usage vehicle tracking system, p122 micom usage,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Exclamation Electronics: a systems approach 4th edition solutions Thijroden 1 125 08-10-2016, 12:13 PM
Last Post: amrutha735
  Automatic Creation of 3D Environments from a Single Sketch Using Content-Centric pdf seminar projects maker 0 334 13-09-2013, 04:03 PM
Last Post: seminar projects maker
  A Modern Approach for Improving Quality of Service in 4G Wireless Networks pdf study tips 0 305 30-05-2013, 04:06 PM
Last Post: study tips
Last Post: study tips
  APPLE – A Novel Approach for Direct Energy Weapon Control project topics 19 6,992 04-03-2013, 10:46 AM
Last Post: seminar tips
  A SOLUTION TO DETECTILLEGAL USAGE seminar tips 0 237 14-02-2013, 02:27 PM
Last Post: seminar tips
  VOICE USAGE TO CHARGE MOBILE PHON seminar tips 0 926 08-02-2013, 03:03 PM
Last Post: seminar tips
  DRINA: A Lightweight and Reliable Routing Approach for in-Network Aggregation seminar flower 0 1,333 08-10-2012, 01:48 PM
Last Post: seminar flower
Last Post: seminar girl
  Virtual Reality Immersive Environments seminar girl 0 392 16-08-2012, 03:23 PM
Last Post: seminar girl