SlideShare a Scribd company logo
1 of 5
Download to read offline
ISSN (e): 2250 – 3005 || Volume, 05 || Issue, 05 || May – 2015 ||
International Journal of Computational Engineering Research (IJCER)
www.ijceronline.com Open Access Journal Page 23
Electronic Identification System using RFID
A.P.Adsul1
, DigvijayDamame2
, PoojaGarde3
, Kajal Jore4
, Kunal Shah5
Assistant Professor1
, U.G. Scholars 2,3,4,5
Department of IT, Sinhgad Institute of Technology and Science, Narhe, Pune-411041
I. INTRODUCTION
RFID is a generic technology concept that refers to the use of radio waves to identify objects. Any
object can be traced using RFID tags when those objects are moving in the network of RFID readers. The RFID
Reader Network here consists of densely deployed RFID Readers which are connected by short-range wireless
technologies in ad hoc mode. Consequently, an RFID system essentially consists of three parts: the RFID tag
itself, the RFID reader device and a backend IT system. For example, in school area the RFID network is
deployed by using Virtual Route Track algorithm. Using this algorithm, the system can real-timely track the
location of the students who are moving within the premises.
RFID – (Radio Frequency Identification) is the wireless use of electromagnetic fields to transfer data,
for the purposes of automatically identifying and tracking tags attached to objects. The tags contain
electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields
produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive
transponder.
RFID tags can be passive, active or battery-assisted passive. An active tag has an on-board battery and
periodically transmits its ID signal. A battery-assisted passive (BAP) has a small battery on board and is
activated when in the presence of an RFID reader. A passive tag is cheaper and smaller because it has no
battery; instead, the tag uses the radio energy transmitted by the reader. However, to operate a passive tag, it
must be illuminated with a power level roughly a thousand times stronger than for signal transmission. That
makes a difference in interference and in exposure to radiation. RFID systems can be classified by the type of
tag and reader. A Passive Reader Active Tag (PRAT) system has a passive reader which only receives radio
signals from active tags (battery operated, transmit only).An Active Reader Passive Tag (ARPT) system has an
active reader, which transmits interrogator signals and also receives authentication replies from passive tags.
An Active Reader Active Tag (ARAT) system uses active tags awoken with an interrogator signal from the
active reader. A variation of this system could also use a Battery-Assisted Passive (BAP) tag which acts like a
passive tag but has a small battery to power the tag's return reporting signal. RFID system has six different
frequency bands. These are 120-150 KHz (LF), 13.56 MHz (HF), 433 MHz (UHF), 865-868 MHz, 2450-
5800 MHz (microwave), 3.1–10 GHz (microwave).
II. SYSTEM OVERVIEW
Figure.1 shows, an active RFID system, active RFID readers are typically connected by physical cables for data
communications purposes. Active RFID systems have also been implemented using a Wi-Fi-based
infrastructure. Using P2P network architecture we will get a more flexible active RFID system.
ABSTRACT:
In this modernization Era and rapid growing metro cities, security is must in every field. This work
describes a location and the identity of the persons using RFID (Radio Frequency Identification) tags
and readers. RFID is an automatic identification (auto-ID) technology that uses tags and readers for
remotely storing and retrieving data. RFID reader can sense (identify) persons, animals, vehicles and
goods by interrogating transponders tagged on them. From this perspective, RFID Reader, Reader
Network is a Sensor and Sensor Network that is context-aware, respectively. However, only sensing is
not enough in many scenarios. Hence this work also proposes a tracking algorithm such as coined
Virtual Route Tracking (VRT), to realize tracking persons or objects in RFID Reader Network.
Electronic Identification System…
www.ijceronline.com Open Access Journal Page 24
Figure 1. System Overview
Figure 2. System Architecture
Figure. 2 demonstrate the system architecture of the RFID-based location system makes use of a
2.4GHz. This architecture includes major elements such as mobile, active tag, reader, node (reader), and server.
A tag is a 2.4 GHz active tag, which is attached to a tracking object. Each node is an active RFID reader that
communicates with the tags and the server. Using this architecture and virtual route track algorithm the location
of the person can easily get track. Architecture helps the system with implementing the use of Wi-Fi
technologies so that when the person get track by the RFID, the location of the person get updated on the server.
This technology is used for contacting end users (PARENTS) i.e. for sending messages to the parents. System
Network protocol stack consists of Application, TCP, IP, WI FI Driver, Physical layers. In Transmitting a
message travels down the stack from the application layer that initiates the message to the network interface that
places the message on network. In receiving message travels up the stack from the network interface to
application layer that uses the data in received message. Within local network the application layer
communicate directly with the WI FI driver.
2.1. VIRTUAL ROUTE TRACK PRINCIPLE
The Virtual Track algorithm is presented in Figure.3. The basis of VRT algorithm is that the debriefing
range of RFID system is very short compared to the distance between readers. Instead of powering the RFID
transponder directly by battery, it gets power through magnetic, electric and electromagnetic coupling with
RFID readers. One or more batteries are embedded for Active transponders. However, the embedded battery
only provides power to run chips, and data are transferred from transponder to reader by modulating on reflected
electromagnetic waves emitted by RFID reader, like the ways of Radars. Thus, the RFID system can achieve a
very short range varied from a few millimeters to several meters.
Figure 3. VRT Principle
Electronic Identification System…
www.ijceronline.com Open Access Journal Page 25
On the contrast, the range of wireless technologies used to connect RFID readers is large. For example,
ZigBee or UWB can connect two readers within 10 meters, and Bluetooth or Wi-Fi is effective at the distance of
100 meters. Therefore, when a transponder is sensed by a reader i.e. the transponder is located in the
interrogation zone of this reader; the real distance between reader and transponder is less than the range of the
RFID system. When the scale of the RFID Reader Network is large enough and the distance of deployed readers
is relatively long, VRT algorithm is very accurate.
The above figure3 indicates the RFID network in which the points denote the RFID reader and the lines
from one point to other point denote the path in which direction object is moving. The figure3 is in the form of
matrix. When an object is moving from reader (1, 1) to reader (2, 2) the straight line considered as track of the
transponder. In the above figure the object is moving following direction. The thick path denotes the actual path
of the object and the virtual line is defined as the track of the object.
Track = Virtual Route = (1, 1) (2, 2) (2, 3) (1, 4) (2, 5) (3,5)
(4, 4) (4, 3) (4, 2) (4, 1)
When a reader interrogates one transponder, the next reader interrogating it along the track MUST be
adjacent to the previous reader. According to the figure 3, it is obvious that the transponder at (2, 3) cannot jump
to (2, 5) directly without activating reader (1, 4), (2, 4) or (3, 4). Hence, the next reader of (2, 3) along the track
MUST be one of following readers: { (1,2), (1,3), (1,4), (2,2), (2,4), (3,2), (3,3), (3,4) } Hence, VRT algorithm
MUST choose adjacent readers along the track. If two successive readers along the track are not adjacent to each
other, special mechanism will be executed to guarantee that each reader along the track is contiguous to its last
and next reader in real-word position. The virtual line connecting readers in figure 3 looks like a Route
transferring data packets along the nodes. The route is not real in this so named as “Virtual Route”. In VRT
algorithm “Virtual Route” is used to stand for track of transponder in the RFID Reader Network. And that is
why this algorithm is coined Virtual Route Tracking (VRT).
Furthermore, the concept of Tracking Vector (TV) is used here [1]. In the collection of tracking
information and calculating the track the tracking vector plays a vital role. The combination of the transponder
identity, the interrogation time and the identifier of reader define as a Tracking Vector. The structure of TV is:
(Ti, tj, Rk) = < Transponder i timestamp j Reader k > Here, the transponder identity is a global unique number
(such as EPC global number) stored in the electronic chip of each transponder and interrogated by reader.
Timestamp is the interrogation time of RFID reader when the transponder entering its interrogation zone. Here
the assumption is that all RFID readers in RFID Reader Network are synchronous. And only one tracking vector
is generated no matter how long a transponder stays within the interrogation zone of one reader. The third
parameter in tracking vector is the identifier of the reader. VRT algorithm uses the position of readers to track
transponders. It is noted that successive selected readers are all adjacent to each other and therefore can form a
Virtual Route, therefore, reader identifiers of two successive Tracking vectors MUST stand for two contiguous
readers in real network.
2.2 TRACKING VECTOR ALGORITHM
The tracking calculation is as given. Suppose the following two TVs are sent to RFID Application
System simultaneously.
{ <T1, t1, R1> <T2, t2, R2> } (t1< t2).
The former reports that the reader with the identifier R1 has interrogated transponder T1 at time indicated by
timestamp t1. And the latter is the result of the reader R2 interrogated the transponder T2 at time indicated by
timestamp t2. If T1 is equal to T2, two Tracking vectors are derived from the same transponder. Suppose t2 is
greater than t1 and two readers are adjacent to each other, Virtual Route (or the track) is: Track = Virtual Route
= R1 → R2. However, the above is merely the simplest and ideal condition of tracking. The generalized
conditions are given as follow.
t1< t2 R1↔R2
T1=T2 t1= t2 R1 ∞ R2 (↔ : Adjacent, ∞ : Not Adjacent )
T1≠T2 t1> t2 R1= R2
Electronic Identification System…
www.ijceronline.com Open Access Journal Page 26
When transponder T1 is equal to T2, these two TVs are derived from one single transponder and
should be classified into the same vector group to calculate the track of this transponder. Otherwise, they are
classified into different vector groups for tracking transponder T1 and T2, respectively. About timestamp, when
t1 is less than t2, it is simply. And if t1 is greater than t2, exchange the sequence of two tracking vectors and it is
exactly as same as the above condition. The relationship of two readers can be grouped into three categories:
Adjacent, Not Adjacent and Equality. It is simply to calculate the condition that reader R1 is adjacent to R2.
However, the condition that R1 is not adjacent to R2 and the condition that R1 is equal to R2 require a more
complex processing method.
III. SYSTEM IMPLEMENTATION
The figure 4 shows the interfacing of Raspberry pi b+. The whole system is implemented by using
Raspberry pi b+ and Nordic nrf24L01. The connection between Raspberry pi b+ and nrf24L01 is shown in
figure 4 and the connection detail is shown in table 1.
Figure 4. Interfacing of Raspberry pi
Figure 5. System Implementation using Raspberry pi
Figure.5 shows the one reader and one tag connection by using router and one to one connector. The connection
of Raspberry pi b+ and nrf24L01 works as a reader as well as tag also.
Following table1 represents the interfacing of the pins of raspberry pi b+
Table 1Raspberry pi Interfacing Pin Details
Radio 7(miso) Gpio9/bcm21
Radio 6(miso) Gpio10/bcm19
Radio 5(sck) Gpio11/bcm23
Radio4 (csn) Gpio7/bcm26
Radio3 (ce) Gpio25/bcm22
Radio2 (3.3) 3.3v
Radio1 (gnd) Gnd
Electronic Identification System…
www.ijceronline.com Open Access Journal Page 27
IV. CONCLUSION
This System describes the concept of location tracking and updating the location using RFID system
which is based on the Virtual Route Track algorithm. System can easily track the location of the object. It helps
in keeping Security as its top priority.VRT algorithm can track tens and hundreds of transponders
simultaneously, instead of only one each time. This helps in time saving and managing multi task as required.
VRT is both effective and efficient in real network. System provides the advance tags and readers to work fast
and efficiently “Electronic Identification System” is going to reduce the crimes and will provide security and
information to parents as well as the society.
REFERENCES
[1]. Wei Jiang, Dan Yu, Yan Ma “A Tracking Algorithm in RFID Reader Network”, Proceedings of the Japan-China Joint Workshop on
Frontier of Computer Science and Technology (FCST'06) , 2006 IEEE
[2]. Felix C. P. Hui, Henry C. B. Chan, and S. H. Fung “RFID-based Location Tracking System Using a Peer-to-Peer Network
Architecture”, Proceedings of the International Multi Conference of Engineers and Computer Scientists Volume I IMECS, March
12 - 14, 2014, Hong Kong
[3]. Junyi Zhou · Jing Shi “RFID localization algorithms and applications—a review”,Science+Business Media, LLC, 2008, 696 – 698.
[4]. BaoXu, Wang Gang UWB Lab, Dept. of Telecommunication Engineering, Jiangsu University, Zhenjiang, Jiangsu Province,
“Random Sampling Algorithm in RFID Indoor Location System”, Proceedings of the Third IEEE International Workshop on
Electronic Design, Test and Applications (DELTA’06) 0-7695-2500-8/05 $20.00 © 2005 IEEE
[5]. Mohammed Bilal, Student, Department of Electronics & Communication, PG Studies, T John Institute of Technology ,“Real Time
Attendance Logging With Multi Node Embedded System Connected Via Wi-Fi”, International Journal of Reconfigurable and
Embedded Systems (IJRES) Vol. 1, No. 3, November 2012, pp. 103~107 ISSN: 2089-4864, 103 -106.
[6]. Nidhi Verma Department of C.S.E. G.C.E.T. Greater Noida India “Determining the Algorithm for Location Based Services Using
Indoor Positioning Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering,
Volume 2, Issue 7, July 2012, ISSN: 2277 128X .
[7]. Ben Ammar Hatem, Faculty of Engineering, University of Moncton, NB, Canada,ehb7342@umoncton.ca Hamam Habib Faculty of
Engineering, University of Moncton, NB, Canada, habib.hamam@umoncton.ca , “Bus Management System Using RFID In WSN”,
European and Mediterranean Conference on Information Systems 2010 ( EMCIS2010 ) April 12-13 2009, Abu Dhabi, UAE.
[8]. Mr. Nilesh Manganakar, Mr. Nikhil Pawar, Mr. Prathamesh Pulaskar, “Real Time Tracking of Complete Transport System Using
GPS”, Proceedings of National Conference on New Horizons in IT - NCNHIT 2013, ISBN 978-93-82338-79-6.

More Related Content

What's hot

Data_Integrity_in_RFID_Systems
Data_Integrity_in_RFID_SystemsData_Integrity_in_RFID_Systems
Data_Integrity_in_RFID_SystemsAlchazidis Nikolas
 
Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...Ghouse Modin Mamdapur
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
A Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID SensorsA Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID SensorsEditor IJMTER
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
 
FINAL YEAR PAPER
FINAL YEAR PAPERFINAL YEAR PAPER
FINAL YEAR PAPERDiwakar Jha
 
Design of Anti-collision Technique for RFID UHF Tag using Verilog
Design of Anti-collision Technique for RFID UHF Tag using VerilogDesign of Anti-collision Technique for RFID UHF Tag using Verilog
Design of Anti-collision Technique for RFID UHF Tag using VerilogIOSR Journals
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionsaeed001
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee trackinggiri529
 
Abstract Radio Frequency Identificatication
Abstract           Radio Frequency IdentificaticationAbstract           Radio Frequency Identificatication
Abstract Radio Frequency Identificaticationvishnu murthy
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)Soumen Santra
 
RFID based indoor tracking system
RFID based indoor tracking systemRFID based indoor tracking system
RFID based indoor tracking systemSherwin Rodrigues
 
Presentation 2 rfid standards & protocols
Presentation 2 rfid standards & protocolsPresentation 2 rfid standards & protocols
Presentation 2 rfid standards & protocolsMouhanad Alkhaldi
 
A Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfA Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfSudipto Krishna Dutta
 
Evaluation of the Technology Supporting the Development of an Assets Tracking...
Evaluation of the Technology Supporting the Development of an Assets Tracking...Evaluation of the Technology Supporting the Development of an Assets Tracking...
Evaluation of the Technology Supporting the Development of an Assets Tracking...Dominique Guinard
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance SystemAtiq Shaikh
 

What's hot (20)

Data_Integrity_in_RFID_Systems
Data_Integrity_in_RFID_SystemsData_Integrity_in_RFID_Systems
Data_Integrity_in_RFID_Systems
 
43 97-101
43 97-10143 97-101
43 97-101
 
Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
A Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID SensorsA Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID Sensors
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
 
FINAL YEAR PAPER
FINAL YEAR PAPERFINAL YEAR PAPER
FINAL YEAR PAPER
 
Design of Anti-collision Technique for RFID UHF Tag using Verilog
Design of Anti-collision Technique for RFID UHF Tag using VerilogDesign of Anti-collision Technique for RFID UHF Tag using Verilog
Design of Anti-collision Technique for RFID UHF Tag using Verilog
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
Abstract Radio Frequency Identificatication
Abstract           Radio Frequency IdentificaticationAbstract           Radio Frequency Identificatication
Abstract Radio Frequency Identificatication
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
 
RFID based indoor tracking system
RFID based indoor tracking systemRFID based indoor tracking system
RFID based indoor tracking system
 
Basics Of Rfid Technology
Basics Of Rfid TechnologyBasics Of Rfid Technology
Basics Of Rfid Technology
 
Presentation 2 rfid standards & protocols
Presentation 2 rfid standards & protocolsPresentation 2 rfid standards & protocols
Presentation 2 rfid standards & protocols
 
A Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfA Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdf
 
Evaluation of the Technology Supporting the Development of an Assets Tracking...
Evaluation of the Technology Supporting the Development of an Assets Tracking...Evaluation of the Technology Supporting the Development of an Assets Tracking...
Evaluation of the Technology Supporting the Development of an Assets Tracking...
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance System
 

Viewers also liked (20)

The solution manual of c by robin
The solution manual of c by robinThe solution manual of c by robin
The solution manual of c by robin
 
BLS AED PROVIDER Licence Nu. 381-15-112165-02-03
BLS AED PROVIDER  Licence Nu. 381-15-112165-02-03BLS AED PROVIDER  Licence Nu. 381-15-112165-02-03
BLS AED PROVIDER Licence Nu. 381-15-112165-02-03
 
RESUME C.J
RESUME C.JRESUME C.J
RESUME C.J
 
Esm
EsmEsm
Esm
 
Pronouns
PronounsPronouns
Pronouns
 
Eee5
Eee5Eee5
Eee5
 
Mariaauxiliadora ativ5
Mariaauxiliadora ativ5Mariaauxiliadora ativ5
Mariaauxiliadora ativ5
 
The College Classroom Fa15 Meeting 5: Active Learning
The College Classroom Fa15 Meeting 5: Active LearningThe College Classroom Fa15 Meeting 5: Active Learning
The College Classroom Fa15 Meeting 5: Active Learning
 
Transfac Referral Program
Transfac Referral ProgramTransfac Referral Program
Transfac Referral Program
 
Garricks-Updated Resume-VA15
Garricks-Updated Resume-VA15Garricks-Updated Resume-VA15
Garricks-Updated Resume-VA15
 
Design fax 967 | Les gros mots du design | Design Biduling
Design fax 967 | Les gros mots du design | Design BidulingDesign fax 967 | Les gros mots du design | Design Biduling
Design fax 967 | Les gros mots du design | Design Biduling
 
Jurandir Fernades
Jurandir Fernades Jurandir Fernades
Jurandir Fernades
 
Matrik
MatrikMatrik
Matrik
 
Could you summarize this passage?
Could you summarize this passage?Could you summarize this passage?
Could you summarize this passage?
 
INSTRUCTOR BLS AED Nu.381-15-114565-02-06
INSTRUCTOR BLS AED Nu.381-15-114565-02-06INSTRUCTOR BLS AED Nu.381-15-114565-02-06
INSTRUCTOR BLS AED Nu.381-15-114565-02-06
 
Venkatraman
VenkatramanVenkatraman
Venkatraman
 
Any share 5.0 secure file sync &amp; sharing for enterprise
Any share 5.0  secure file sync &amp; sharing for enterprise Any share 5.0  secure file sync &amp; sharing for enterprise
Any share 5.0 secure file sync &amp; sharing for enterprise
 
Make du Jour ipadpalooza16
Make du Jour ipadpalooza16Make du Jour ipadpalooza16
Make du Jour ipadpalooza16
 
Radio Astronomy and radio telescopes
Radio Astronomy and radio telescopesRadio Astronomy and radio telescopes
Radio Astronomy and radio telescopes
 
Xianweijing
XianweijingXianweijing
Xianweijing
 

Similar to Electronic Identification System using RFID

A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...ijwmn
 
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...ijwmn
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Hari
 
Electronic Toll Collection System Using RFID seminar.pptx
Electronic Toll Collection System Using RFID seminar.pptxElectronic Toll Collection System Using RFID seminar.pptx
Electronic Toll Collection System Using RFID seminar.pptxnirdeshmucha1
 
RFID based mobile robot for indoor navigation
RFID based mobile robot for indoor navigationRFID based mobile robot for indoor navigation
RFID based mobile robot for indoor navigationDhivakar K
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFIDBharath Chapala
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyIRJET Journal
 
Running Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docxRunning Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docxtoltonkendal
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)Robiul Islam
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
 
Mikel_Berdufi_RFID_NFC_REPORT
Mikel_Berdufi_RFID_NFC_REPORTMikel_Berdufi_RFID_NFC_REPORT
Mikel_Berdufi_RFID_NFC_REPORTMikel Berdufi
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDOmer Almas
 
Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakornn7046
 
Radio Frequency identification (RFID)
Radio Frequency identification (RFID)Radio Frequency identification (RFID)
Radio Frequency identification (RFID)Kamel Alhomsi
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 

Similar to Electronic Identification System using RFID (20)

A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
 
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems...
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
Electronic Toll Collection System Using RFID seminar.pptx
Electronic Toll Collection System Using RFID seminar.pptxElectronic Toll Collection System Using RFID seminar.pptx
Electronic Toll Collection System Using RFID seminar.pptx
 
RFID based mobile robot for indoor navigation
RFID based mobile robot for indoor navigationRFID based mobile robot for indoor navigation
RFID based mobile robot for indoor navigation
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFID
 
RFID
RFIDRFID
RFID
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for Society
 
Running Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docxRunning Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docx
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)
 
RFID AND LIBRARIES
RFID AND LIBRARIESRFID AND LIBRARIES
RFID AND LIBRARIES
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
 
Mikel_Berdufi_RFID_NFC_REPORT
Mikel_Berdufi_RFID_NFC_REPORTMikel_Berdufi_RFID_NFC_REPORT
Mikel_Berdufi_RFID_NFC_REPORT
 
Rfid3
Rfid3Rfid3
Rfid3
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakor
 
Radio Frequency identification (RFID)
Radio Frequency identification (RFID)Radio Frequency identification (RFID)
Radio Frequency identification (RFID)
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Electronic Identification System using RFID

  • 1. ISSN (e): 2250 – 3005 || Volume, 05 || Issue, 05 || May – 2015 || International Journal of Computational Engineering Research (IJCER) www.ijceronline.com Open Access Journal Page 23 Electronic Identification System using RFID A.P.Adsul1 , DigvijayDamame2 , PoojaGarde3 , Kajal Jore4 , Kunal Shah5 Assistant Professor1 , U.G. Scholars 2,3,4,5 Department of IT, Sinhgad Institute of Technology and Science, Narhe, Pune-411041 I. INTRODUCTION RFID is a generic technology concept that refers to the use of radio waves to identify objects. Any object can be traced using RFID tags when those objects are moving in the network of RFID readers. The RFID Reader Network here consists of densely deployed RFID Readers which are connected by short-range wireless technologies in ad hoc mode. Consequently, an RFID system essentially consists of three parts: the RFID tag itself, the RFID reader device and a backend IT system. For example, in school area the RFID network is deployed by using Virtual Route Track algorithm. Using this algorithm, the system can real-timely track the location of the students who are moving within the premises. RFID – (Radio Frequency Identification) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. RFID tags can be passive, active or battery-assisted passive. An active tag has an on-board battery and periodically transmits its ID signal. A battery-assisted passive (BAP) has a small battery on board and is activated when in the presence of an RFID reader. A passive tag is cheaper and smaller because it has no battery; instead, the tag uses the radio energy transmitted by the reader. However, to operate a passive tag, it must be illuminated with a power level roughly a thousand times stronger than for signal transmission. That makes a difference in interference and in exposure to radiation. RFID systems can be classified by the type of tag and reader. A Passive Reader Active Tag (PRAT) system has a passive reader which only receives radio signals from active tags (battery operated, transmit only).An Active Reader Passive Tag (ARPT) system has an active reader, which transmits interrogator signals and also receives authentication replies from passive tags. An Active Reader Active Tag (ARAT) system uses active tags awoken with an interrogator signal from the active reader. A variation of this system could also use a Battery-Assisted Passive (BAP) tag which acts like a passive tag but has a small battery to power the tag's return reporting signal. RFID system has six different frequency bands. These are 120-150 KHz (LF), 13.56 MHz (HF), 433 MHz (UHF), 865-868 MHz, 2450- 5800 MHz (microwave), 3.1–10 GHz (microwave). II. SYSTEM OVERVIEW Figure.1 shows, an active RFID system, active RFID readers are typically connected by physical cables for data communications purposes. Active RFID systems have also been implemented using a Wi-Fi-based infrastructure. Using P2P network architecture we will get a more flexible active RFID system. ABSTRACT: In this modernization Era and rapid growing metro cities, security is must in every field. This work describes a location and the identity of the persons using RFID (Radio Frequency Identification) tags and readers. RFID is an automatic identification (auto-ID) technology that uses tags and readers for remotely storing and retrieving data. RFID reader can sense (identify) persons, animals, vehicles and goods by interrogating transponders tagged on them. From this perspective, RFID Reader, Reader Network is a Sensor and Sensor Network that is context-aware, respectively. However, only sensing is not enough in many scenarios. Hence this work also proposes a tracking algorithm such as coined Virtual Route Tracking (VRT), to realize tracking persons or objects in RFID Reader Network.
  • 2. Electronic Identification System… www.ijceronline.com Open Access Journal Page 24 Figure 1. System Overview Figure 2. System Architecture Figure. 2 demonstrate the system architecture of the RFID-based location system makes use of a 2.4GHz. This architecture includes major elements such as mobile, active tag, reader, node (reader), and server. A tag is a 2.4 GHz active tag, which is attached to a tracking object. Each node is an active RFID reader that communicates with the tags and the server. Using this architecture and virtual route track algorithm the location of the person can easily get track. Architecture helps the system with implementing the use of Wi-Fi technologies so that when the person get track by the RFID, the location of the person get updated on the server. This technology is used for contacting end users (PARENTS) i.e. for sending messages to the parents. System Network protocol stack consists of Application, TCP, IP, WI FI Driver, Physical layers. In Transmitting a message travels down the stack from the application layer that initiates the message to the network interface that places the message on network. In receiving message travels up the stack from the network interface to application layer that uses the data in received message. Within local network the application layer communicate directly with the WI FI driver. 2.1. VIRTUAL ROUTE TRACK PRINCIPLE The Virtual Track algorithm is presented in Figure.3. The basis of VRT algorithm is that the debriefing range of RFID system is very short compared to the distance between readers. Instead of powering the RFID transponder directly by battery, it gets power through magnetic, electric and electromagnetic coupling with RFID readers. One or more batteries are embedded for Active transponders. However, the embedded battery only provides power to run chips, and data are transferred from transponder to reader by modulating on reflected electromagnetic waves emitted by RFID reader, like the ways of Radars. Thus, the RFID system can achieve a very short range varied from a few millimeters to several meters. Figure 3. VRT Principle
  • 3. Electronic Identification System… www.ijceronline.com Open Access Journal Page 25 On the contrast, the range of wireless technologies used to connect RFID readers is large. For example, ZigBee or UWB can connect two readers within 10 meters, and Bluetooth or Wi-Fi is effective at the distance of 100 meters. Therefore, when a transponder is sensed by a reader i.e. the transponder is located in the interrogation zone of this reader; the real distance between reader and transponder is less than the range of the RFID system. When the scale of the RFID Reader Network is large enough and the distance of deployed readers is relatively long, VRT algorithm is very accurate. The above figure3 indicates the RFID network in which the points denote the RFID reader and the lines from one point to other point denote the path in which direction object is moving. The figure3 is in the form of matrix. When an object is moving from reader (1, 1) to reader (2, 2) the straight line considered as track of the transponder. In the above figure the object is moving following direction. The thick path denotes the actual path of the object and the virtual line is defined as the track of the object. Track = Virtual Route = (1, 1) (2, 2) (2, 3) (1, 4) (2, 5) (3,5) (4, 4) (4, 3) (4, 2) (4, 1) When a reader interrogates one transponder, the next reader interrogating it along the track MUST be adjacent to the previous reader. According to the figure 3, it is obvious that the transponder at (2, 3) cannot jump to (2, 5) directly without activating reader (1, 4), (2, 4) or (3, 4). Hence, the next reader of (2, 3) along the track MUST be one of following readers: { (1,2), (1,3), (1,4), (2,2), (2,4), (3,2), (3,3), (3,4) } Hence, VRT algorithm MUST choose adjacent readers along the track. If two successive readers along the track are not adjacent to each other, special mechanism will be executed to guarantee that each reader along the track is contiguous to its last and next reader in real-word position. The virtual line connecting readers in figure 3 looks like a Route transferring data packets along the nodes. The route is not real in this so named as “Virtual Route”. In VRT algorithm “Virtual Route” is used to stand for track of transponder in the RFID Reader Network. And that is why this algorithm is coined Virtual Route Tracking (VRT). Furthermore, the concept of Tracking Vector (TV) is used here [1]. In the collection of tracking information and calculating the track the tracking vector plays a vital role. The combination of the transponder identity, the interrogation time and the identifier of reader define as a Tracking Vector. The structure of TV is: (Ti, tj, Rk) = < Transponder i timestamp j Reader k > Here, the transponder identity is a global unique number (such as EPC global number) stored in the electronic chip of each transponder and interrogated by reader. Timestamp is the interrogation time of RFID reader when the transponder entering its interrogation zone. Here the assumption is that all RFID readers in RFID Reader Network are synchronous. And only one tracking vector is generated no matter how long a transponder stays within the interrogation zone of one reader. The third parameter in tracking vector is the identifier of the reader. VRT algorithm uses the position of readers to track transponders. It is noted that successive selected readers are all adjacent to each other and therefore can form a Virtual Route, therefore, reader identifiers of two successive Tracking vectors MUST stand for two contiguous readers in real network. 2.2 TRACKING VECTOR ALGORITHM The tracking calculation is as given. Suppose the following two TVs are sent to RFID Application System simultaneously. { <T1, t1, R1> <T2, t2, R2> } (t1< t2). The former reports that the reader with the identifier R1 has interrogated transponder T1 at time indicated by timestamp t1. And the latter is the result of the reader R2 interrogated the transponder T2 at time indicated by timestamp t2. If T1 is equal to T2, two Tracking vectors are derived from the same transponder. Suppose t2 is greater than t1 and two readers are adjacent to each other, Virtual Route (or the track) is: Track = Virtual Route = R1 → R2. However, the above is merely the simplest and ideal condition of tracking. The generalized conditions are given as follow. t1< t2 R1↔R2 T1=T2 t1= t2 R1 ∞ R2 (↔ : Adjacent, ∞ : Not Adjacent ) T1≠T2 t1> t2 R1= R2
  • 4. Electronic Identification System… www.ijceronline.com Open Access Journal Page 26 When transponder T1 is equal to T2, these two TVs are derived from one single transponder and should be classified into the same vector group to calculate the track of this transponder. Otherwise, they are classified into different vector groups for tracking transponder T1 and T2, respectively. About timestamp, when t1 is less than t2, it is simply. And if t1 is greater than t2, exchange the sequence of two tracking vectors and it is exactly as same as the above condition. The relationship of two readers can be grouped into three categories: Adjacent, Not Adjacent and Equality. It is simply to calculate the condition that reader R1 is adjacent to R2. However, the condition that R1 is not adjacent to R2 and the condition that R1 is equal to R2 require a more complex processing method. III. SYSTEM IMPLEMENTATION The figure 4 shows the interfacing of Raspberry pi b+. The whole system is implemented by using Raspberry pi b+ and Nordic nrf24L01. The connection between Raspberry pi b+ and nrf24L01 is shown in figure 4 and the connection detail is shown in table 1. Figure 4. Interfacing of Raspberry pi Figure 5. System Implementation using Raspberry pi Figure.5 shows the one reader and one tag connection by using router and one to one connector. The connection of Raspberry pi b+ and nrf24L01 works as a reader as well as tag also. Following table1 represents the interfacing of the pins of raspberry pi b+ Table 1Raspberry pi Interfacing Pin Details Radio 7(miso) Gpio9/bcm21 Radio 6(miso) Gpio10/bcm19 Radio 5(sck) Gpio11/bcm23 Radio4 (csn) Gpio7/bcm26 Radio3 (ce) Gpio25/bcm22 Radio2 (3.3) 3.3v Radio1 (gnd) Gnd
  • 5. Electronic Identification System… www.ijceronline.com Open Access Journal Page 27 IV. CONCLUSION This System describes the concept of location tracking and updating the location using RFID system which is based on the Virtual Route Track algorithm. System can easily track the location of the object. It helps in keeping Security as its top priority.VRT algorithm can track tens and hundreds of transponders simultaneously, instead of only one each time. This helps in time saving and managing multi task as required. VRT is both effective and efficient in real network. System provides the advance tags and readers to work fast and efficiently “Electronic Identification System” is going to reduce the crimes and will provide security and information to parents as well as the society. REFERENCES [1]. Wei Jiang, Dan Yu, Yan Ma “A Tracking Algorithm in RFID Reader Network”, Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology (FCST'06) , 2006 IEEE [2]. Felix C. P. Hui, Henry C. B. Chan, and S. H. Fung “RFID-based Location Tracking System Using a Peer-to-Peer Network Architecture”, Proceedings of the International Multi Conference of Engineers and Computer Scientists Volume I IMECS, March 12 - 14, 2014, Hong Kong [3]. Junyi Zhou · Jing Shi “RFID localization algorithms and applications—a review”,Science+Business Media, LLC, 2008, 696 – 698. [4]. BaoXu, Wang Gang UWB Lab, Dept. of Telecommunication Engineering, Jiangsu University, Zhenjiang, Jiangsu Province, “Random Sampling Algorithm in RFID Indoor Location System”, Proceedings of the Third IEEE International Workshop on Electronic Design, Test and Applications (DELTA’06) 0-7695-2500-8/05 $20.00 © 2005 IEEE [5]. Mohammed Bilal, Student, Department of Electronics & Communication, PG Studies, T John Institute of Technology ,“Real Time Attendance Logging With Multi Node Embedded System Connected Via Wi-Fi”, International Journal of Reconfigurable and Embedded Systems (IJRES) Vol. 1, No. 3, November 2012, pp. 103~107 ISSN: 2089-4864, 103 -106. [6]. Nidhi Verma Department of C.S.E. G.C.E.T. Greater Noida India “Determining the Algorithm for Location Based Services Using Indoor Positioning Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, July 2012, ISSN: 2277 128X . [7]. Ben Ammar Hatem, Faculty of Engineering, University of Moncton, NB, Canada,ehb7342@umoncton.ca Hamam Habib Faculty of Engineering, University of Moncton, NB, Canada, habib.hamam@umoncton.ca , “Bus Management System Using RFID In WSN”, European and Mediterranean Conference on Information Systems 2010 ( EMCIS2010 ) April 12-13 2009, Abu Dhabi, UAE. [8]. Mr. Nilesh Manganakar, Mr. Nikhil Pawar, Mr. Prathamesh Pulaskar, “Real Time Tracking of Complete Transport System Using GPS”, Proceedings of National Conference on New Horizons in IT - NCNHIT 2013, ISBN 978-93-82338-79-6.