1. The document describes a proposed multi-touch table system with RFID technology that could be used in hotels.
2. The system would allow customers to place food orders directly from their table by selecting items on a multi-touch display and authenticating with an RFID card.
3. The table would be connected to backend systems to send orders to the kitchen and deduct amounts from the customer's account.
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Onyebuchi nosiri
This document describes the development of an RFID-based attendance system. The system uses RFID tags embedded in employee ID cards that are read by an RFID reader when employees enter or exit through an automated door. The RFID reader is connected to a computer running time attendance software to record and manage employees' check-ins and check-outs. The system aims to provide a more efficient and accurate alternative to manual attendance tracking methods. RFID technology allows contactless identification of employees and collects attendance data automatically when employees pass through the door.
IRJET- Smart Shopping Trolley System using MicrocontrollerIRJET Journal
The document proposes a smart shopping trolley system using RFID technology and a microcontroller to automatically calculate the total bill of items placed in the trolley. This system would help reduce the time customers spend in long queues at billing counters in shopping malls by detecting RFID tags on products as they are added to the trolley and instantly displaying the running total cost. The proposed design and its components like RFID tags, reader, microcontroller, and LCD display are described along with how the system would work to speed up the shopping checkout process.
Secondary Research Study Summary of RFID Industrybizpresenter
The document provides information on Pavan Kumar's professional experience and areas of expertise including business analysis, product management, and digital media consulting. It lists the industries and domains he has worked in such as ecommerce, mobile apps, education, and healthcare. His contact information is also included.
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesKamal Spring
As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive applications including payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. In this paper, we propose SBVLC - a secure system for barcode-based visible light communication (VLC) between smart phones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop two secure data exchange schemes. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and mobile payment. SBVLC is evaluated through extensive experiments on both Android and I OS smart phones.
In our application we have implemented the idea of QR code as password verification to overcome all the hacking issues. We have two modules as banker and the user. In the user module there will be two categories they are shopping and paying bill. In the shopping section user will shop the product and enter the card and bank details and send request to the banker regarding the transaction purpose. And in turn the banker module there are two categories they are the create OTP and the send OTP details. The banker will check the details of the user request regarding the purchase and all the card and balance details and prepare a password in the form of QR code. The password will be I the form of QR code and will be sent to the user through the mail service to the user personal mail id. In turn the user will pay the bill by loading the QR from the mail and scanning. On scanning the password will generate if the password matches with the banker details the transaction will become successful. Thus password hacking, key logging and eavesdropping issues will be overcome.
The document provides an overview of bar code technology and its uses and benefits. It discusses how bar codes work by encoding data in varying widths of black and white bars that can be scanned electronically. Bar codes allow for fast, accurate, and efficient data entry. The document outlines common applications of bar codes in retail, warehouses, healthcare, transportation and more. It also discusses the components needed for a bar code system and provides an example of how bar codes have improved operations at a library by streamlining check-in/check-out processes.
Technology and Libraries:RFID vs. Barcodes a presentation given at MELCOM International 27th Conference
May 23-25, 2005 Alexandria, Egypt
by
Houeida Kammourié-Charara
Head, Information Systems Department
University Libraries
Notre Dame University-Louaizé
Wnl 160 introducing rfid technology by anupamKishor Satpathy
Paper Presented during International Conference on What’s next in libraries? Trends, Space, and partnerships held during January 21-23, 2015 at NIT Silchar, Assam. It is being jointly organized by NIT Silchar, in association with its USA partner the Mortenson Center for International Library Programs, University of Illinois at Urbana-Champaign.
The Google Nexus S offers support for Near Field Communication (NFC), an extension to an RFID smart card protocol popularly used for secure access, metro passes (Oyster/Clipper), and electronic money (FeliCa/Octopus). NFC in smartphones promises adding these features to the phone you carry by allowing the it to emulate both RFID tag and reader.
NFC additionally adds new capabilities like exchanging configuration data such as WiFi settings, trading vCard contact information, reading URLs, triggering SMS text messages or initiating calls, and secure bi-directional communication between NFC devices.
This session will cover what NFC and RFID is and is not, what Android on the Nexus S is currently capable of, and some examples of how to add NFC to your apps.
http://where2conf.com/where2011/public/schedule/detail/18443
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Onyebuchi nosiri
This document describes the development of an RFID-based attendance system. The system uses RFID tags embedded in employee ID cards that are read by an RFID reader when employees enter or exit through an automated door. The RFID reader is connected to a computer running time attendance software to record and manage employees' check-ins and check-outs. The system aims to provide a more efficient and accurate alternative to manual attendance tracking methods. RFID technology allows contactless identification of employees and collects attendance data automatically when employees pass through the door.
IRJET- Smart Shopping Trolley System using MicrocontrollerIRJET Journal
The document proposes a smart shopping trolley system using RFID technology and a microcontroller to automatically calculate the total bill of items placed in the trolley. This system would help reduce the time customers spend in long queues at billing counters in shopping malls by detecting RFID tags on products as they are added to the trolley and instantly displaying the running total cost. The proposed design and its components like RFID tags, reader, microcontroller, and LCD display are described along with how the system would work to speed up the shopping checkout process.
Secondary Research Study Summary of RFID Industrybizpresenter
The document provides information on Pavan Kumar's professional experience and areas of expertise including business analysis, product management, and digital media consulting. It lists the industries and domains he has worked in such as ecommerce, mobile apps, education, and healthcare. His contact information is also included.
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesKamal Spring
As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive applications including payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. In this paper, we propose SBVLC - a secure system for barcode-based visible light communication (VLC) between smart phones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop two secure data exchange schemes. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and mobile payment. SBVLC is evaluated through extensive experiments on both Android and I OS smart phones.
In our application we have implemented the idea of QR code as password verification to overcome all the hacking issues. We have two modules as banker and the user. In the user module there will be two categories they are shopping and paying bill. In the shopping section user will shop the product and enter the card and bank details and send request to the banker regarding the transaction purpose. And in turn the banker module there are two categories they are the create OTP and the send OTP details. The banker will check the details of the user request regarding the purchase and all the card and balance details and prepare a password in the form of QR code. The password will be I the form of QR code and will be sent to the user through the mail service to the user personal mail id. In turn the user will pay the bill by loading the QR from the mail and scanning. On scanning the password will generate if the password matches with the banker details the transaction will become successful. Thus password hacking, key logging and eavesdropping issues will be overcome.
The document provides an overview of bar code technology and its uses and benefits. It discusses how bar codes work by encoding data in varying widths of black and white bars that can be scanned electronically. Bar codes allow for fast, accurate, and efficient data entry. The document outlines common applications of bar codes in retail, warehouses, healthcare, transportation and more. It also discusses the components needed for a bar code system and provides an example of how bar codes have improved operations at a library by streamlining check-in/check-out processes.
Technology and Libraries:RFID vs. Barcodes a presentation given at MELCOM International 27th Conference
May 23-25, 2005 Alexandria, Egypt
by
Houeida Kammourié-Charara
Head, Information Systems Department
University Libraries
Notre Dame University-Louaizé
Wnl 160 introducing rfid technology by anupamKishor Satpathy
Paper Presented during International Conference on What’s next in libraries? Trends, Space, and partnerships held during January 21-23, 2015 at NIT Silchar, Assam. It is being jointly organized by NIT Silchar, in association with its USA partner the Mortenson Center for International Library Programs, University of Illinois at Urbana-Champaign.
The Google Nexus S offers support for Near Field Communication (NFC), an extension to an RFID smart card protocol popularly used for secure access, metro passes (Oyster/Clipper), and electronic money (FeliCa/Octopus). NFC in smartphones promises adding these features to the phone you carry by allowing the it to emulate both RFID tag and reader.
NFC additionally adds new capabilities like exchanging configuration data such as WiFi settings, trading vCard contact information, reading URLs, triggering SMS text messages or initiating calls, and secure bi-directional communication between NFC devices.
This session will cover what NFC and RFID is and is not, what Android on the Nexus S is currently capable of, and some examples of how to add NFC to your apps.
http://where2conf.com/where2011/public/schedule/detail/18443
Barcode and RFID technology are identification tools. Barcodes use visual patterns that are scanned to represent data, while RFID uses radio waves to track tags attached to objects. RFID provides advantages like greater security, distance reading and updating capabilities compared to barcodes. However, RFID technology is generally more expensive than barcodes. Both technologies have various applications in areas like member identification, circulation, and stock verification in libraries.
"All about rfid" Internet of Things WorkshopCarla Diana
Presentation given by Jeff Hoefs and myself at IIT Institute of Design in Chicago. The presentation was meant to kickoff a one-day workshop and inspire the workshop participants to create new products and systems usine RFID technology.
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...Manos Theocharopoulos
This document discusses the economics, practical applications, and constraints of adopting radio frequency identification (RFID) technology across healthcare enterprises. It provides an introduction to RFID, including the basic components, types of tags, frequency bands, and standards. It then examines RFID applications in healthcare, including implications of integrating RFID into the "Internet of Things." The document also reviews RFID deployments in other industries and addresses privacy, security, and regulatory concerns around using RFID in healthcare settings.
This document summarizes a research paper on using near field communication (NFC) tags to enable mobile commerce (m-commerce). It discusses how an Android application could read NFC tags on products to add them to a virtual shopping cart. Payment could then be made via the app using existing online payment methods. The document provides background on m-commerce, mobile payments, and how NFC tags work. It also discusses security protocols for NFC-based communications between a user's mobile device and a merchant's terminal for contactless payments. The proposed system aims to make shopping more convenient and efficient for consumers compared to traditional retail models.
1) The document describes a smart library management system that uses RFID technology to automate processes like book checking in and out.
2) RFID tags are attached to books and readers are used to scan the tags and update a database, allowing users to check books in and out without human intervention.
3) The system aims to streamline library management and reduce errors by automating manual tasks like tracking book loans and returns and calculating overdue fines.
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET Journal
This document summarizes a survey on a secret sharing approach using QR codes that prevents cheating. It discusses how QR codes can store large amounts of data but lack security. The proposed approach uses the characteristics of QR codes to achieve secret sharing and distribute private data securely among participants using QR tags. Each participant receives a marked QR tag, and the original data can only be retrieved when an authorized number of participants come together. This approach provides security, detectability of cheaters, and adjustable payload for the QR codes.
e-wallet , The future of Cards and MoneyVikram Dahiya
The document discusses e-wallets and near field communication (NFC) technology. E-wallets store digital payment information and have advantages over traditional cards like unlimited lifetime and storage of current balance. NFC allows contactless payment and data transfer between devices in close proximity by using magnetic field induction. NFC is supported on many mobile platforms and enables mobile payment apps like Google Wallet.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
The document provides guidance on maximizing the performance of mobile barcode campaigns. It discusses four basic steps: 1) strategy and planning, 2) code generation and publishing, 3) call to action, and 4) performance tracking. Some key points include choosing the right barcode format like QR codes, ensuring codes are large enough and clear enough to scan, testing codes on different devices, crafting an effective call to action, and using tracking to analyze campaign performance. The document emphasizes strategic planning, usability testing, and data analysis to engage consumers and optimize campaigns.
With changing lifestyles, high income growth, faster than ever changing fashions – there is no denying the fact that the retail industry today has been climbing the ladder of growth at a phenomenally rapid pace. The traditional grocery store has given its way to the big supermarkets and malls which has led to manifold increase in retail business. With increase in size and number of retail organizations there is cut throat competition between the different players. It is widely felt that the key differentiator between the successful and the not so successful players is mainly in their outlook towards adopting new technology. Customer satisfaction is the most important element of retail sales for which most retail organizations today are keen to automate their existing systems and adopt upcoming technologies with open arms. As the retailers are scaling up their business, the need of the hour is a robust IT system to manage stock and customers
This document discusses automatic data capture using bar code technology. It defines automatic data capture as inputting data without typing by using bar code readers to scan encoded bar codes. The document describes the basic components of bar codes, including linear and 2D bar codes. It focuses on universal product codes (UPCs), explaining how UPC bar codes work by encoding product information and using a check digit for verification. The benefits of bar codes for accurate and efficient data collection are also summarized.
This document is a project report submitted by Govind Kumar Gourav for a Bachelor of Technology degree. It describes the development of a mobile attendance management system using an AT89S52 microcontroller. The system utilizes radio frequency identification (RFID) technology to uniquely identify and record attendance for individuals. The report includes sections on introduction and objectives, literature review, system design and implementation, conclusion, and references.
NFC wallet is 'white label' mobile payment application. It provides contactless payment and is based on Mastercard Digital Enablement Services (MDES) and Visa Token Services (VTS).
RFID is an interesting technology that has generated a great deal of interest in the last few years. For this study, the focus is specifically on the impact of RFID technology in a supermarket.
By understanding the details behind RFID and clearing some misconceptions regarding privacy and security, this report aims to clarify the adoption of RFID in major supermarkets such as FairPrice.
Towards the end, we aim to provide a summarized solution on how RFID technology can benefit the store and the steps required to implement it in a supermarket.
This document describes an RFID-based system to track students on school buses and notify parents. The system uses passive RFID tags issued to each student and RFID readers installed at the entry points of buses. When a student boards or exits a bus, their RFID tag is scanned by the reader which records the student ID and time. This data is sent to the school's database system via Zigbee. Parents receive email notifications when their child boards or exits the bus. The system aims to safely transport students and reduce parents' concerns by informing them of their child's movements between home and school.
Contactless technology uses short-range wireless communication to allow contactless payments and identification. It originated from RFID technology and has advanced to include near-field communication (NFC) in smartphones and credit/debit cards, allowing tap-and-go mobile payments. Major benefits are speed, convenience, and security for small purchases without signatures or PINs required. However, stolen cards could be used and not all merchants currently accept contactless payments in India.
This document presents a seminar on barcode technology. It defines what a barcode is, provides a brief history of barcodes, and describes the main types of barcodes. It then explains how barcodes work, including the different parts of a barcode and how scanners read barcodes. The document outlines some common applications of barcodes and lists advantages and disadvantages. It concludes by thanking the audience and offering to answer any questions.
Regulatory aspect of barcode technology ( Introduction, FDA rule, Benefits of barcode, terminology, Symbologies, Types of barcode, Pharmacode, Applications of barcode, Types of barcode readers,Pharmaceutical)
A smart card is a device that includes an embedded integrated circuit chip (ICC) that can be either a secure microcontroller or equivalent intelligence with internal memory or a memory chip alone. The card connects to a reader with direct physical contact or with a remote contactless radio frequency interface..
Any Interest please Contact with me via email: dhamrai.liton@gmail.com
The document contains 13 multiple choice questions about a conversation between Mary, Sue, and John discussing plans to go to a concert. They decide to take John's car to the concert after ruling out other options like Mary's car, which is not working, walking because it is too far and dark, taking the underground because it is too far, and a taxi because it is too expensive. They will take the number 53 bus, which stops opposite the park next to the pub, and meet at 6:45 to arrive at the concert by 7:30.
Learn about z/VM 6.2 Live Guest Relocation with Linux Middleware. A z/VM single system image (SSI) cluster is a multi z/VM system environment in which the z/VM
systems can be managed as a single resource pool and guests can be moved from one system to
another while they are running. For more information on IBM System z, visit http://ibm.co/PNo9Cb.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
Barcode and RFID technology are identification tools. Barcodes use visual patterns that are scanned to represent data, while RFID uses radio waves to track tags attached to objects. RFID provides advantages like greater security, distance reading and updating capabilities compared to barcodes. However, RFID technology is generally more expensive than barcodes. Both technologies have various applications in areas like member identification, circulation, and stock verification in libraries.
"All about rfid" Internet of Things WorkshopCarla Diana
Presentation given by Jeff Hoefs and myself at IIT Institute of Design in Chicago. The presentation was meant to kickoff a one-day workshop and inspire the workshop participants to create new products and systems usine RFID technology.
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...Manos Theocharopoulos
This document discusses the economics, practical applications, and constraints of adopting radio frequency identification (RFID) technology across healthcare enterprises. It provides an introduction to RFID, including the basic components, types of tags, frequency bands, and standards. It then examines RFID applications in healthcare, including implications of integrating RFID into the "Internet of Things." The document also reviews RFID deployments in other industries and addresses privacy, security, and regulatory concerns around using RFID in healthcare settings.
This document summarizes a research paper on using near field communication (NFC) tags to enable mobile commerce (m-commerce). It discusses how an Android application could read NFC tags on products to add them to a virtual shopping cart. Payment could then be made via the app using existing online payment methods. The document provides background on m-commerce, mobile payments, and how NFC tags work. It also discusses security protocols for NFC-based communications between a user's mobile device and a merchant's terminal for contactless payments. The proposed system aims to make shopping more convenient and efficient for consumers compared to traditional retail models.
1) The document describes a smart library management system that uses RFID technology to automate processes like book checking in and out.
2) RFID tags are attached to books and readers are used to scan the tags and update a database, allowing users to check books in and out without human intervention.
3) The system aims to streamline library management and reduce errors by automating manual tasks like tracking book loans and returns and calculating overdue fines.
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET Journal
This document summarizes a survey on a secret sharing approach using QR codes that prevents cheating. It discusses how QR codes can store large amounts of data but lack security. The proposed approach uses the characteristics of QR codes to achieve secret sharing and distribute private data securely among participants using QR tags. Each participant receives a marked QR tag, and the original data can only be retrieved when an authorized number of participants come together. This approach provides security, detectability of cheaters, and adjustable payload for the QR codes.
e-wallet , The future of Cards and MoneyVikram Dahiya
The document discusses e-wallets and near field communication (NFC) technology. E-wallets store digital payment information and have advantages over traditional cards like unlimited lifetime and storage of current balance. NFC allows contactless payment and data transfer between devices in close proximity by using magnetic field induction. NFC is supported on many mobile platforms and enables mobile payment apps like Google Wallet.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
The document provides guidance on maximizing the performance of mobile barcode campaigns. It discusses four basic steps: 1) strategy and planning, 2) code generation and publishing, 3) call to action, and 4) performance tracking. Some key points include choosing the right barcode format like QR codes, ensuring codes are large enough and clear enough to scan, testing codes on different devices, crafting an effective call to action, and using tracking to analyze campaign performance. The document emphasizes strategic planning, usability testing, and data analysis to engage consumers and optimize campaigns.
With changing lifestyles, high income growth, faster than ever changing fashions – there is no denying the fact that the retail industry today has been climbing the ladder of growth at a phenomenally rapid pace. The traditional grocery store has given its way to the big supermarkets and malls which has led to manifold increase in retail business. With increase in size and number of retail organizations there is cut throat competition between the different players. It is widely felt that the key differentiator between the successful and the not so successful players is mainly in their outlook towards adopting new technology. Customer satisfaction is the most important element of retail sales for which most retail organizations today are keen to automate their existing systems and adopt upcoming technologies with open arms. As the retailers are scaling up their business, the need of the hour is a robust IT system to manage stock and customers
This document discusses automatic data capture using bar code technology. It defines automatic data capture as inputting data without typing by using bar code readers to scan encoded bar codes. The document describes the basic components of bar codes, including linear and 2D bar codes. It focuses on universal product codes (UPCs), explaining how UPC bar codes work by encoding product information and using a check digit for verification. The benefits of bar codes for accurate and efficient data collection are also summarized.
This document is a project report submitted by Govind Kumar Gourav for a Bachelor of Technology degree. It describes the development of a mobile attendance management system using an AT89S52 microcontroller. The system utilizes radio frequency identification (RFID) technology to uniquely identify and record attendance for individuals. The report includes sections on introduction and objectives, literature review, system design and implementation, conclusion, and references.
NFC wallet is 'white label' mobile payment application. It provides contactless payment and is based on Mastercard Digital Enablement Services (MDES) and Visa Token Services (VTS).
RFID is an interesting technology that has generated a great deal of interest in the last few years. For this study, the focus is specifically on the impact of RFID technology in a supermarket.
By understanding the details behind RFID and clearing some misconceptions regarding privacy and security, this report aims to clarify the adoption of RFID in major supermarkets such as FairPrice.
Towards the end, we aim to provide a summarized solution on how RFID technology can benefit the store and the steps required to implement it in a supermarket.
This document describes an RFID-based system to track students on school buses and notify parents. The system uses passive RFID tags issued to each student and RFID readers installed at the entry points of buses. When a student boards or exits a bus, their RFID tag is scanned by the reader which records the student ID and time. This data is sent to the school's database system via Zigbee. Parents receive email notifications when their child boards or exits the bus. The system aims to safely transport students and reduce parents' concerns by informing them of their child's movements between home and school.
Contactless technology uses short-range wireless communication to allow contactless payments and identification. It originated from RFID technology and has advanced to include near-field communication (NFC) in smartphones and credit/debit cards, allowing tap-and-go mobile payments. Major benefits are speed, convenience, and security for small purchases without signatures or PINs required. However, stolen cards could be used and not all merchants currently accept contactless payments in India.
This document presents a seminar on barcode technology. It defines what a barcode is, provides a brief history of barcodes, and describes the main types of barcodes. It then explains how barcodes work, including the different parts of a barcode and how scanners read barcodes. The document outlines some common applications of barcodes and lists advantages and disadvantages. It concludes by thanking the audience and offering to answer any questions.
Regulatory aspect of barcode technology ( Introduction, FDA rule, Benefits of barcode, terminology, Symbologies, Types of barcode, Pharmacode, Applications of barcode, Types of barcode readers,Pharmaceutical)
A smart card is a device that includes an embedded integrated circuit chip (ICC) that can be either a secure microcontroller or equivalent intelligence with internal memory or a memory chip alone. The card connects to a reader with direct physical contact or with a remote contactless radio frequency interface..
Any Interest please Contact with me via email: dhamrai.liton@gmail.com
The document contains 13 multiple choice questions about a conversation between Mary, Sue, and John discussing plans to go to a concert. They decide to take John's car to the concert after ruling out other options like Mary's car, which is not working, walking because it is too far and dark, taking the underground because it is too far, and a taxi because it is too expensive. They will take the number 53 bus, which stops opposite the park next to the pub, and meet at 6:45 to arrive at the concert by 7:30.
Learn about z/VM 6.2 Live Guest Relocation with Linux Middleware. A z/VM single system image (SSI) cluster is a multi z/VM system environment in which the z/VM
systems can be managed as a single resource pool and guests can be moved from one system to
another while they are running. For more information on IBM System z, visit http://ibm.co/PNo9Cb.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a research paper that investigates optimally locating SVC and IPFC FACTS devices on the IEEE 30-bus system to reduce power losses and improve voltage profiles under normal, overload, and contingency conditions using Particle Swarm Optimization. The paper presents mathematical models of the SVC and IPFC and describes how PSO is used to determine the optimal location and ratings of the devices. Simulation results show that with optimally located SVC and IPFC, total power losses are reduced and voltage profiles are improved under various system conditions compared to without the FACTS devices.
David Blaine is an American magician and illusionist known for his high-profile feats of endurance. In 2009, he performed a stunt where he remained suspended in a glass box over the Thames River in London for over 30 days without food. The stunt was intended to showcase Blaine's ability to withstand hunger and isolation for an extended period of time suspended above a busy city.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that proposes a method to semantically detect plagiarism in research papers using text mining techniques. It introduces the problem of plagiarism in research and the need for automated detection methods. The proposed method uses TF-IDF to encode documents and LSI for semantic indexing. It collects research papers, preprocesses text, encodes documents with TF-IDF, and indexes them semantically using LSI to find similar papers and detect plagiarism.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
The document describes the design of a stand-alone photovoltaic (PV) system for a college hostel using two methods. Method I is an analytical method that uses solar radiation data to size the PV array, batteries, and inverter based on the hostel's daily load. Method II does not use solar data and instead sizes the system based solely on the daily load chart. Both methods perform a cost analysis comparing the proposed stand-alone PV system to connecting to the conventional electric grid. A case study is presented applying both methods to a girls' hostel in India with 312 PV panels, 19557 battery capacity, and a 41580W inverter required based on Method I calculations.
RFID Based Smart Trolley for Supermarket AutomationIRJET Journal
This document describes a proposed RFID-based smart trolley system for supermarket automation. The system would attach RFID tags to all supermarket items and integrate an RFID reader and display into shopping trolleys. As customers add items to their trolley, the RFID reader would detect the items' tags and display the item details and running total on the trolley's display. Customer purchases and billing totals would be wirelessly transmitted to the supermarket's backend systems using Zigbee technology. The proposed system aims to streamline the shopping experience for customers by automating item detection and display of purchase information in real-time as items are added to the trolley.
IRJET- Development and Implementation of Smart RFID based Library Managem...IRJET Journal
This document describes the development and implementation of a smart RFID-based library management system using Raspberry Pi and μFR Nano RFID technology with an Android operating system. Key aspects of the system include a μFR Nano RFID reader/writer operating at 13.56 MHz to identify books and member cards tagged with RFID chips. Software was created using the Android Studio development environment and utilizes a SQLite database on the Raspberry Pi to store and retrieve book and member information. The system was tested successfully at the authors' university library to automate issuing, returning, and searching of books through contactless identification of RFID tags.
The document describes an e-wallet application that allows users to make payments using Near Field Communication (NFC) technology on Android smartphones. It discusses how the application works, including user registration and login, adding payment balances by activating vouchers, and making expenditures by scanning NFC tags on smart posters. The application transfers user and transaction data between the smartphone app and a web server for validation. The document also evaluates the application's performance and network usage, finding that data reception uses more bandwidth than transmission and that internet connectivity was the main constraint reported by users. It concludes by recommending a focus on security and expanding platform support for broader use.
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
The document describes an RFID-based bike rental system that uses miniDES encryption on RFID tags to securely store bike identifiers. Key points:
1) RFID tags attached to bikes are encrypted with miniDES to securely store bike IDs readable only by authenticated readers.
2) A microcontroller decrypts tag data and verifies bike IDs, recording check-out and check-in times from an RTC to calculate rental fees.
3) .NET software receives bike data from the microcontroller via serial to manage a database of bike statuses, rental fees, and a web portal interface.
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
RFID tags are used to automate a bike renting system. Each bike is tagged with a passive RFID tag storing a unique ID encrypted with the miniDES algorithm. RFID readers scan the tags and send the encrypted IDs to a microcontroller for decryption and authentication. The microcontroller verifies the IDs and records rental data like user, bike ID, and timestamps which is sent to a backend database for management and reporting. The miniDES algorithm provides lightweight encryption suitable for the low-power RFID tags and embedded systems used while ensuring security of rental transactions.
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
The document describes an RFID-based bike rental system that uses miniDES encryption on RFID tags to securely store bike identifiers. Key points:
1) RFID tags attached to bikes are encrypted with miniDES to securely store bike IDs readable only by authenticated readers.
2) A microcontroller decrypts tag data and tracks bike check-ins/check-outs using a real-time clock, communicating data to a .NET application.
3) The .NET system calculates rental charges, displays bike statuses on a web portal, and allows editing rental amounts. This automates the bike rental process using RFID technology and encryption.
IRJET- RFID based Shop Billing Machine using Raspberry PiIRJET Journal
This document describes a RFID-based smart shopping and billing system using a Raspberry Pi. The system uses RFID tags to track items selected by customers. As customers select items, an RFID reader interfaced with a Raspberry Pi writes the item information to an RFID card given to the customer. When customers are ready to pay, they place the RFID card on the reader, which generates their bill based on the items stored on the card. The system aims to streamline the shopping and billing process and reduce long lines typically seen at checkout counters. Key components include passive RFID tags for items, an MFRC522 RFID reader/writer module connected to a Raspberry Pi, and a display screen to
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...IRJET Journal
The document proposes a system using NFC chips embedded in Indian currency to help identify black money and counterfeit currency. The NFC chips would contain identifying information like the currency value, tag number, and expiration date. The system uses four methods: 1) Money counting devices with NFC readers for offices/shops, 2) NFC readers that attach to Android phones for small businesses, 3) QR codes containing account details for vendors who can't afford readers, and 4) cashless transactions using cards. Together these allow the Reserve Bank of India to track all transactions and identify unreported income. The goal is to effectively eliminate black money and fake currency.
IRJET- RFID Based Shop Billing Machine using Raspberry PiIRJET Journal
The document proposes a smart shopping and billing system using RFID technology with a Raspberry Pi. Customers would be given an RFID card to store the items they select, and their total bill would be generated automatically when they place the card near the RFID reader connected to the Raspberry Pi. This system aims to make the shopping and billing process more efficient and convenient by eliminating long queues typically seen at billing counters.
A Survey on RFID Based Smart Shopping System and Automated BillingIRJET Journal
This document summarizes a survey on RFID-based smart shopping systems and automated billing. It discusses how RFID technology can be used to replace barcodes and allow multiple items to be scanned simultaneously, reducing checkout times. The objectives of the survey are to identify key technologies in RFID smart shopping/billing systems, review advantages/disadvantages, and analyze different strategies. Several studies that implemented RFID-based systems are summarized, demonstrating benefits like reduced queues, automated billing, and item tracking. However, some systems lacked payment flexibility or security measures. The survey aims to design an improved smart shopping cart system using RFID.
IRJET- Cashless Automatic Rationing System by using GSM and RFID TechnologyIRJET Journal
This document describes a proposed automatic ration distribution system using RFID and GSM technologies. The system aims to address inaccuracies and unauthorized sales associated with traditional ration card systems. It would use RFID tags instead of ration cards, and an automated mechanism controlled by a microcontroller to dispense and track ration quantities. The microcontroller would verify customers, calculate amounts, operate dispensing devices, and send purchase notifications via GSM. This cashless, contactless system intends to accurately and securely distribute ration materials without human intervention.
This document describes an RFID-based attendance system that uses RFID cards to verify the identity and attendance of users. The system consists of an RFID reader, RFID tags, a microcontroller, and LCD display. When an authorized user's RFID card is scanned by the reader, the microcontroller verifies the data matches its database before recording attendance. The system provides automated attendance tracking to replace manual paper records while preventing proxy attendance.
NFiD: An NFC based system for Digital Business CardsIRJET Journal
The document proposes an NFC-based system to replace paper business cards with digital business cards that are instantly transferred to a user's smartphone when they scan another person's NFC tag. It describes the technical aspects of using NFC technology to store and share contact information digitally. An Android app is presented that allows users to view, save, and manage contacts scanned from NFC tags and stored in the cloud.
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
This document summarizes an RFID and Zigbee-based indoor campus inventory tracking system. It describes how RFID tags attached to objects can be identified and tracked using RFID readers. Zigbee modules are used to wirelessly transmit inventory data from the readers to a central server. The system uses passive RFID tags powered by electromagnetic fields from readers. When a tagged object enters the read range, its data is transmitted via Zigbee to allow centralized tracking of inventory across a campus.
RFID is a technology that uses radio waves to automatically identify objects. RFID tags attached to objects are scanned by an RFID reader to transmit data wirelessly. A basic RFID system consists of an antenna that emits radio signals, a transceiver that controls data acquisition and communication, and a transponder tag that contains identifying information transmitted to the reader. The document discusses applications of RFID technology including tracking objects and automating processes like access control and parking systems.
Automatic identification and data capture (AIDC) technologies electronically collect data without manual entry. This includes barcode, RFID, NFC, and biometrics. RFID uses radio waves to automatically identify tags attached to objects and track them. An RFID system has tags, a reader, and antenna. Tags can be active (battery-powered) or passive. RFID operates at various frequencies and is used for applications like supply chain management, asset tracking, and electronic toll collection due to advantages like non-line-of-sight scanning and tagging of multiple items simultaneously. NFC is a short-range wireless technology that allows data exchange between devices when touched together, and has modes for card emulation, peer-to-
Automation of shopping cart to ease queue in malls by using RFIDSudher Sun
RFID technology is proposed to automate the shopping cart and billing process in malls. The current barcode system requires line of sight scanning and is slow. The proposed system uses RFID tags embedded in products that can be automatically read by an RFID reader in the cart from a distance. As shoppers add items to their cart, the tags are read and the items and running total are displayed. This allows for a more efficient checkout where the total is already known without additional scanning. The system architecture uses an RFID reader, microcontroller, Zigbee for wireless communication, and an LCD for display. Benefits include simplified billing, increased speed, and an improved overall shopping experience.
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...my Pandit
Dive into the steadfast world of the Taurus Zodiac Sign. Discover the grounded, stable, and logical nature of Taurus individuals, and explore their key personality traits, important dates, and horoscope insights. Learn how the determination and patience of the Taurus sign make them the rock-steady achievers and anchors of the zodiac.
How MJ Global Leads the Packaging Industry.pdfMJ Global
MJ Global's success in staying ahead of the curve in the packaging industry is a testament to its dedication to innovation, sustainability, and customer-centricity. By embracing technological advancements, leading in eco-friendly solutions, collaborating with industry leaders, and adapting to evolving consumer preferences, MJ Global continues to set new standards in the packaging sector.
Navigating the world of forex trading can be challenging, especially for beginners. To help you make an informed decision, we have comprehensively compared the best forex brokers in India for 2024. This article, reviewed by Top Forex Brokers Review, will cover featured award winners, the best forex brokers, featured offers, the best copy trading platforms, the best forex brokers for beginners, the best MetaTrader brokers, and recently updated reviews. We will focus on FP Markets, Black Bull, EightCap, IC Markets, and Octa.
At Techbox Square, in Singapore, we're not just creative web designers and developers, we're the driving force behind your brand identity. Contact us today.
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
buy old yahoo accounts buy yahoo accountsSusan Laney
As a business owner, I understand the importance of having a strong online presence and leveraging various digital platforms to reach and engage with your target audience. One often overlooked yet highly valuable asset in this regard is the humble Yahoo account. While many may perceive Yahoo as a relic of the past, the truth is that these accounts still hold immense potential for businesses of all sizes.
Building Your Employer Brand with Social MediaLuanWise
Presented at The Global HR Summit, 6th June 2024
In this keynote, Luan Wise will provide invaluable insights to elevate your employer brand on social media platforms including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok. You'll learn how compelling content can authentically showcase your company culture, values, and employee experiences to support your talent acquisition and retention objectives. Additionally, you'll understand the power of employee advocacy to amplify reach and engagement – helping to position your organization as an employer of choice in today's competitive talent landscape.
At Techbox Square, in Singapore, we're not just creative web designers and developers, we're the driving force behind your brand identity. Contact us today.
Best practices for project execution and deliveryCLIVE MINCHIN
A select set of project management best practices to keep your project on-track, on-cost and aligned to scope. Many firms have don't have the necessary skills, diligence, methods and oversight of their projects; this leads to slippage, higher costs and longer timeframes. Often firms have a history of projects that simply failed to move the needle. These best practices will help your firm avoid these pitfalls but they require fortitude to apply.
Storytelling is an incredibly valuable tool to share data and information. To get the most impact from stories there are a number of key ingredients. These are based on science and human nature. Using these elements in a story you can deliver information impactfully, ensure action and drive change.
3 Simple Steps To Buy Verified Payoneer Account In 2024SEOSMMEARTH
Buy Verified Payoneer Account: Quick and Secure Way to Receive Payments
Buy Verified Payoneer Account With 100% secure documents, [ USA, UK, CA ]. Are you looking for a reliable and safe way to receive payments online? Then you need buy verified Payoneer account ! Payoneer is a global payment platform that allows businesses and individuals to send and receive money in over 200 countries.
If You Want To More Information just Contact Now:
Skype: SEOSMMEARTH
Telegram: @seosmmearth
Gmail: seosmmearth@gmail.com
SATTA MATKA SATTA FAST RESULT KALYAN TOP MATKA RESULT KALYAN SATTA MATKA FAST RESULT MILAN RATAN RAJDHANI MAIN BAZAR MATKA FAST TIPS RESULT MATKA CHART JODI CHART PANEL CHART FREE FIX GAME SATTAMATKA ! MATKA MOBI SATTA 143 spboss.in TOP NO1 RESULT FULL RATE MATKA ONLINE GAME PLAY BY APP SPBOSS
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Cc32497503
1. Rajat Verma, Preksha Gupta, Prof.C.Malathy / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 2, March -April 2013, pp.497-503
Multi-Touch Table With Rfid Technology For Hotels
Rajat Verma#1, Preksha Gupta#2, Prof.C.Malathy#3
#
Department of Computer Science and Engineering, SRM University, Kattankulathur
Chennai, India
ABSTRACT
With the introduction of multi-touch, a available in different forms. Due to the improvement
new form of human computer interaction is of processing power of modern desktop computers,
introduced. Due to recent innovations multi- it no longer requires expensive equipment. Modern
touch technology has become affordable. Unlike computer interaction consists of a monitor, keyboard
interaction on a desktop computer multi-touch and a mouse. Limited by the operating system, it
allows multiple users to interact with the same allows us only to control a single pointer on the
device at the same time. To demonstrate the vast screen. With multi-touch, multiple input pointers are
possibilities of multi-touch technologies an introduced to the system which all can be controlled
‘interactive RFID-based Multi-touch Device’ can independently. Depending on the size of the display
be constructed which can be utilised in a hotel. multi-touch allows multiple persons to interact with
The objective of the project is to enhance the the same display at the same time.
customer’s dining experience and to provide an
enjoyable and user friendly interface thereby Radio-frequency identification (RFID) is
reducing human effort and time. The multi-touch the use of a wireless non-contact system that uses
table constructed is a camera based multi-touch radio-frequency electromagnetic fields to transfer
device which is designed using front-side data from a tag attached to an object, for the
illumination technique. Card associated with a purposes of automatic identification and tracking. It
RFID tag will be used, priced to a specific amount has been extensively applied to various fields such
which is issued to the customer at the reception as product surveillance, supply chain, automobile
desk. Each order table at the restaurant will have parts tracking and telemedicine. A RFID system is
a multi-touch device along with the RFID reader. composed of three major components, including
Customer can now interact with the multi-touch reader, tag and middleware. Unlike traditional bar-
device by showing his RFID card and place an code system, RFID systems can carry dynamic as
order by selecting from the menu displayed on well as static data. Some tags require no battery and
the order table. This project proposes the are powered and read at short ranges via magnetic
methodology of designing an interactive system fields (electromagnetic induction). Others use a local
along with applications to verify the effectiveness power source and emit radio waves (electromagnetic
of the same. radiation at radio frequencies).Tag contains
electronically stored information which may be read
Keywords - multi-touch, RFID, interactive, front- from up to several meters away. Unlike a bar code,
side illumination the tag does not need to be within line of sight of the
reader and may be embedded in the tracked object.
1. INTRODUCTION The project will consist of a multi-touch
Multi-touch (or multitouch) denotes a set of table containing a RFID reader. A card associated
interaction techniques which allow computer users with a RFID tag will be used. Two computer
to control graphical applications with several fingers. systems will be required, one to be used as a client
Multi-touch consists of a touch screen (screen, table, and other one as server. Network connectivity needs
wall, etc.) or touchpad, as well as software that to be established between the reception desk, multi-
recognizes multiple simultaneous touch points, as touch table or order table and chef desk. This whole
opposed to the standard touch screen (e.g. computer setup can be utilised in a hotel/restaurant. A
touchpad, ATM), which recognizes only one touch customer can buy a card (with the RFID tag) priced
point. This effect is achieved through a variety of to a specific amount which he thinks is required or
means, including but not limited to: heat, finger necessary for future transactions. Each table in a
pressure, high capture rate cameras, infrared light, restaurant will have a multi-touch device along with
optic capture, tuned electromagnetic induction, the RFID reader . Customer will show the card on
ultrasonic receivers,transducer microphones,laser this device and his details will be displayed along
rangefinders, and shadow capture. Multi-touch with the menu card on the table. He can then place
displays are interactive graphics devices that the order according to the balance left in his card.
combine camera and tactile technologies for direct This order will be sent to the chef‟s system. A
on-screen manipulation. Multi-touch technology is database will be needed for this purpose. Using
not entirely new, since the 1970s it has been queries the chef will be able to identify the table
497 | P a g e
2. Rajat Verma, Preksha Gupta, Prof.C.Malathy / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 2, March -April 2013, pp.497-503
from which the request has been made and confirm in his account. As soon as he places the order, the
the order. ordered amount will be deducted from customer‟s
account updating the database and timer will start
2. SYSTEM OVERVIEW showing the estimated time required for the service
In this section, we will overview the to be processed. The customer‟s request will be sent
proposed rfid-based multi-touch interactive system to chef system. After receiving the order, estimated
from two different angles. Figure 1 shows the time required for processing the request (preparing
structure of the proposed rfid based interactive the order) will be sent to the customer table by the
display system. One is the hardware configuration chef.
that contains two main components, RFID reader
and multi-touch table. The rfid reader is user to
identify the user or customer which uses the rfid tag
and the multi-touch table is an interface for user to
operate the proposed interactive display system. The
other part is from software viewpoint where the
client and server are connected in an ad-hoc network
and applications are run on both sides along with the
blob tracker for multi-touch.
Fig. 2 A flowchart of the proposed interactive RFID-
based multi-touch device.
Fig. 1 A graphical overview of RFID-based multi-
touch interaction pipeline
3. HARDWARE AND SOFTWARE
Figure 2 shows the flowchart of the rfid- CONFIGURATION
based interactive multi-touch system. The This project aims at developing the rfid
receptionist at the reception desk will login into the based multi-touch interactive system which
system by entering the appropriate username and combines display technology with sensors which are
password. The customer arriving at the Reception capable of tracking multiple points of input. The
Desk has two options: New Registration, for a new idea is that this would allow users to interact with
customer or Recharge for an existing customer. the computer in a natural way .Using this display
Accordingly details like first name, last name, email more than one user can interact with the system
id, mobile no, amount and the rfid tag unique simultaneously.
identification number for the customer will be added Hardware and software specifications for this project
or updated in the existing database of the hotel. Now are as follows:-
the customer is ready to place an order at the Hardware Requirements:-
restaurant. The rfid reader is connected to the system
available at the customer side which is also in Web Camera of minimum resolution 640 X 480
conjunction with the multi-touch table. At the same Acrylic sheet or glass( thickness ~6-10 mm)
time connection needs to be established between the Two computer systems with minimum of 1 GB
customer table and the chef system using RAM.
adhoc(computer-to–computer) network by manually Light source for increasing light intensity when
configuring the IP addresses of both the systems. ambient light is not sufficient and to overcome
The customer will show his rfid card issued to him shadow problem.
before at the reception to the rfid reader at the RFID-Reader module with RS232 output.
restaurant table. As soon as she shows the card, user RFID tag/cards.
details will be displayed including the amount USB to serial adapter.
present in his account along with the menu card. A display projector (if needed).
Now the customer will place the order by selecting
different options available on the menu using the
multi-touch table according to the amount available
498 | P a g e
3. Rajat Verma, Preksha Gupta, Prof.C.Malathy / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 2, March -April 2013, pp.497-503
Software Specifications:- user views the scene on the panel and decides to
Touchlib, free open source multi-touch framework interact. To interact with the device, the user touches
libraries like CONFIG.BAT, GATEWAY.BAT the device panel. On the hardware level the camera
AND SERVER.BAT are required for configuring registers touch. Because the captured frame might
this multi-touch device. not only include the contact points but also a (static)
VISUAL BASIC-6.0 and Video Ocx Tools have background, it is required to perform image
been used in application development for the processing on each captured frame. The captured
multi-touch device. frame is converted to a gray scale image and the
Hyper terminal to test connection with rfid reader. static background is removed by subtracting the
Client and server side applications using VB6.0 current frame with a reference frame. As a result the
for reception, table and chef desk. frame only shows white contours (blobs) which are
Windows socket programming used for both client the points of contact. By tracking these blobs the
and server side applications. system becomes capable of sensing touch. In order
to track the blobs, the positions are transmitted to the
3.1 Design considerations of the rfid-based multi- blob tracker which matches blobs from earlier
touch device. frames with the current frame.After processing,
There are various techniques available for events will be triggered which can be used in a
the construction of the multi-touch device. But from multi-touch capable application. The application
the starting of this project, my prime area of modifies objects in the current scene according to
consideration was the camera based multi-touch the new blob positions. The result is returned to the
techniques. The camera based multi-touch user through the display. The performance of a
techniques have been widely utilized in various camera based multi-touch device depends on the
multi-touch devices. Microsoft Surface which used hardware and software. When a user touches a
released previously and created a lot of fuss was multi-touch device, it expects the device to respond
based on a camera based multi-touch technique directly. The responsiveness of the device depends
(precisely saying rear-side illumination on the time it needs to process the user's input and
technique).Front-side illumination technique is present the users a result through the display. In the
camera based multi-touch technique but because of interaction pipeline two levels are important, the
its impreciseness and low reliability, its potential has hardware and the software level. Using a camera
not been fully utilized. In my project I have used which is capable of 30 frames per second allows
front-side illumination technique only but with smooth interaction with the system. However, this
certain modifications so as to increase the reliability requires a system that can handle image processing
and preciseness of the technique. Before designing a and blob tracking in 1/30 of a second. A
multi-touch device one has to consider various combination of smart algorithms implemented in
factors such as the environment in which the device software and fast hardware helps to minimize the
would be used, the target audience, the cost which latency and increase the responsiveness of the device.
would be involved in the construction of the device,
etc. The following considerations were kept in mind 3.1.1.1 Front-side illumination technique
while making the device: There may be a case when A technique for designing a touch interface,
the surrounding light may not seem sufficient. To based on diffused illumination is known as Front-
tackle that case an array small bulbs are put on the side Illumination (FI). This technique is based on
boundary of the touch sensitive surface. The cost of light being diffused. However instead of using
construction of the device needed to be kept low; infrared light sources, it depends on the ambient
hence I decided not to use the projector. Instead the light from the environment. With FI the diffuser is
camera inputs are directly supplied to the computer. attached to the front side of the display. The ambient
light illuminates the diffuser, which from the
camera's point of view, results in an evenly colored
rectangle. By touching the surface, shadows will
appear underneath the fingertips because the ambient
light cannot reach it. These points are detected by
the camera and a touch is registered. Figure 4. shows
a basic setup for FI. Because the used touch library
requires touched spots to be colored white, a simple
invert filter is being applied. FI can be seen as the
Fig. 3 Multi-touch table outside and inside view. cheapest way of creating a camera based multi-touch
capable device.
3.1.1 Camera-based multi-touch techniques
Camera based multi-touch devices share the
same concept of processing and filtering captured
images on patterns. The pipeline begins when the
499 | P a g e
4. Rajat Verma, Preksha Gupta, Prof.C.Malathy / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 2, March -April 2013, pp.497-503
(static) background a highpass filter is applied. This
filter compares the contrast in the image and only
allows `high' values to pass through (depending on a
pre-set value). As a result only the touched spots will
be visible. Depending on the used diffuser and
infrared LEDs the result might show weak blobs, in
this case we can add a scaler filter to amplify the
brightness of the blobs. Finally, the rectify filter is
applied resulting in clear blobs ready for tracking. It
is used to filter out noise and reduce the gray scale
image to a black and white image only displaying
the actually touched areas.
An example of the Touchlib image processing
results can be found in Figure 5.
Fig. 4 Schematic view of the multi-touch panel using
front side illumination
3.1.2 Choosing an appropriate camera device
When choosing a camera it is
recommended to find out which sensor is used and
whether the data sheets are available for this sensor.
Whilst high-end consumer USB cameras are capable
of transmitting images of VGA resolution (640X480
pixels) at reasonable frame rates, they often
introduce latency. Because this reduces the
responsiveness of the multi-touch devices, it is
recommended to use a FireWire based camera
instead. Depending on the size of the display and the
projected image it is recommended to use at least a
camera running a VGA resolution because of Fig. 5. Example of Touchlib filter chain using
precision. The frame rate should be at least 30 front side illumination
frames per second to allow smooth interaction.
3.2.2 Blob detection and tracking
3.2 Multi-touch detection and processing. In Touchlib the blob tracker handles the
To perform camera based multi-touch detection and blob detection and tracking. Blob detection is done
processing several frameworks are available. In this to detect touch in a camera image. In order to follow
paper we describe the used multi-touch framework, the movement of touch, the blob tracker compares
how a multi-touch framework connects to a multi- the detected touch locations in a frame with the
touch application and the different types of gestures. positions of the previous frame. In each time step,
Touchlib requests a frame from the video camera.
3.2.1 TouchLib After a frame has been processed, the resulting
Our multi-touch system uses Touchlib image is used to perform blob tracking. By using the
which is a free open source cross platform multi- OpenCV function cvFindContours() we obtain a list
touch framework which provides video processing of contours found in the current frame. All found
and blob tracking for multi-touch devices based on contours (and their properties) are stored in a
FTIR and DI. Video processing in Touchlib is done contours list. Each contour is checked on whether it
through the Intel's OpenCV graphics library. is a fiducial marker or a touch. On each contour
Touchlib currently runs on MS Windows, Linux and Touchlib tries to fit a polygon which matches the
Mac OS X. When Touchlib is used for the first time outlines of the contour. If the fitted polygon is build
(in an application) it stores a copy of the current out of four points (we are talking here of square
frame into the memory. This frame is used as a fiducial marker) it might be a possible fiducial
reference frame and used to perform background marker. Next it will check whether the angle of all
subtraction on the next frames. Front-side the corners matches approximately 90 degrees. If the
illumination requires more video processing filters result is true, the contour is considered a fiducial and
before blob tracking can be applied. First a capture the position (center) will be calculated. It will also
filter is selected depending on the used interface assign a unique tag identifier based on the pattern
(USB or Firewire). If the system uses FI it is found within the square. If the polygon is more
required to add an invert filter because Touchlib complex than four points, it is assumed to be a touch.
expects white colored blobs. The next filter is the Touchlib will fit an ellipse on the contour. The
background subtraction filter. After removing the
500 | P a g e
5. Rajat Verma, Preksha Gupta, Prof.C.Malathy / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 2, March -April 2013, pp.497-503
properties of the ellipse are used to determine the implemented in conjunction with the Touchlib
position, orientation and the size of a blob. If the size software designed for the multi-touch table. The
of the blob fits the minimum and maximum three modules for the reception desk, multi-touch
requirements on height and width, the blob will be table ,chef table are integrated using the algorithms
added to the blob list. specially designed for this purpose and various
In order to track blobs it is required to have forms which demonstrate the use of such an
at least two data sets that contain blobs in different application is shown in the project. Figure 6 shows
states. We first define the two data sets. the various modules developed for RFID integrated
The first data set contains the blob list from a multi-touch device.
previous frame and is defined as follows:
p1; p2; p3;…………….; pn
where n is the number of active blobs in the previous
frame. The second set contains the blobs list of the
current frame and is defined as follows:
c1; c2; c3;……………..; cm
where m is the number of active blobs in the current
frame.
After each frame, the data from set p is replaced by
set c. Set c will be filled with the new blob list.
3.2.3 Generating events
In the last part of the blob tracking, Figure 6(a) Reception desk module.
Touchlib prepares the events to be triggered. First
Touchlib walks through the list of currently active
blobs. If a blob is new in the current frame (it did not
match with a blob in the previous frame) it will
contain an ID with the value -1. In that case a new
ID will be generated and assigned. After the
assignment a “touch event” of the blob will be
dispatched. If a blob in the current frame matches a
blob of the previous frame, it will use the same
identifier of the previous frame. Depending on the
amount of movement an update event will be
dispatched. If the delta of movement is higher than
the set value of distanceThreshold it means the blob
Figure 6(b) Chef desk module.
„traveled‟ over a larger distance than one would
assume to be correct. In this case instead of an
update event a “touch event” is dispatched instead. If
the delta of movement from the current and the
previous frame is below the value of
minimumDisplacementThreshold, no update event
will occur. After Touchlib processed the list of
currently active blobs, it compares the list with the
blob list of the previous frame. If a blob was active
in the previous frame but has not been found in the
current frame, the blob is marked for deletion and a
“touch up event” will be dispatched.
3.2.3 Programming Language Interfaces
The client side or reception desk module Figure 6(c) Order table module.
will consist of programs and algorithms which are
written in accordance with communication 3.3 RFID Reader/RFID tag
performed over a ad-hoc network. The serial An RFID system consists of a tag reader
communication ports will be able to transfer and (also called the interrogator) and a tag. All
receive the data via the RFID reader and the same communication between the tag and reader occurs
informed can be sent via the network to the server completely through a wireless link that is sometimes
side or the chef system using windows socket called an air interface. Through a sequence of
programming. The coding parts are written in Visual commands sent and received between both devices
Basic 6.0 which creates several forms or applications (called the inventory round), an RFID reader can
to be used by the interactive system and are identify the electronic product code (EPC) of an
501 | P a g e
6. Rajat Verma, Preksha Gupta, Prof.C.Malathy / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 2, March -April 2013, pp.497-503
RFID tag. For passive tags, the basic idea is that the encoding and updates. Passive RFID Tags have no
interrogator initiates an interrogation round with a internal power supply. An electrical current induced
query command. The query command essentially in the antenna by the incoming radio frequency
“wakes up” the tag, which responds with the signal provides just enough power for the integrated
appropriate information. Figure 7 shows a basic circuit (IC) in the RFID tag to power up and transmit
block diagram of the tag/reader system. Figure 8 a response. RFID tags communicate in various ways
shows the RFID reader with RS 232 port used in the with the RFID reader. The aerial (antenna) has to be
project. designed to both collect power from the incoming
signal and also to transmit the outbound signal. Lack
of an onboard power supply means that the passive
RFID tag can be quite small: commercially available
products exist that can be embedded under the skin.
In this project I will be using a passive RFID tag.
These do not require batteries and have an unlimited
life span. As we have already seen there are two
important components of a RFID tag – A microchip
and a coil (antenna). The antenna receives power
Fig. 7 Block diagram of typical RFID tag/reader
and RF signals from the RFID reader and sends
system
those signals to the chip. The chip receives those
signals, computes them and sends back the data to
RFID reader. We can figure out the precise working
of a RFID tag through this diagram.
Fig. 8 RFID reader with RS 232 kit.
Note from Figure 7 that many RFID readers
and measurement systems actually use a three-port
RF component called a circulator that gives both
transmit and receive front ends the ability to use the
same antenna. Note that with many RFID, standards,
timing information between transmit and Fig. 6 Working of RFID tag.
receive commands is defined by strict guidelines. In
fact, a sort of “handshaking” is required between the To recognize the identity of an RFID tag,
tag and reader to complete an interrogation RFID reader sends radio signals which is captured
round. This actually creates a unique test challenge by the coil (working as antenna) for the tag. The coil
because the instrumentation must be capable of the receives these signals as alternating current and
same behaviour. On an interrogator, an embedded passes to the chip. The chip extracts both the power
processor is required to decode and generate and the information from this alternating current. By
commands within a tight timing interval. As communicating with the non volatile memory of the
discussed in a later section, this design is quite chip that stores unique id as well as other
similar to field-programmable gate array (FPGA)- information, it sends back the required signal to the
enabled RFID measurement systems, which use antenna which is then transmitted to the RFID reader.
similar embedded processing to fully emulate either There are three main roles a RFID reader plays other
a tag or a reader. RFID tags come in many shapes than signalling RFID tag to transmit desired
and sizes each suited to a specific application, but all information back to the RFID reader. Firstly, a
RFID tags can be generally grouped into two main RFID reader has the responsibility of keeping RFID
categories, regardless if they are encased, a sticky tags powered up. Secondly, a RFID reader
label or just a solid button like tag .RFID tags are demodulates incoming signals from the RFID tag
either “passive” (no battery) or “active” (self- down. This process slows the incoming signals
powered by a battery). RFID tags also can be read- down enough so that the RFID reader is able to
only (stored data can be read but not changed), process the signals. Finally, after the incoming
read/write (stored data can be altered or rewritten), signals are slowed down, RFID then has the
or a combination, in which some data is permanently responsibility of decoding the incoming signals into
stored while other memory is left accessible for later the words people can interpret
502 | P a g e
7. Rajat Verma, Preksha Gupta, Prof.C.Malathy / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 2, March -April 2013, pp.497-503
4. CONCLUSIONS AND FUTURE WORK [6] Touchlib:www.multigesture.net
A novel interactive system that integrates [7] Experiences with interactive multi-touch
RFID and multi-touch technologies is proposed in tables : Wim Fikkert, Michiel Hakvoort,
this paper. Customers can now have a whole new Paul Van Der Vet
experience by using the touch interface for ordering [8] http://www.technovelgy.com/ct/Technolog
their food at restaurants and paying via the RFID y-Article.asp?ArtNum=4 for RFID working.
card issued to them. With the construction of our [9] http://www.engineersgarage.com/insight/ho
own camera based multi-touch table we have w-rfid-tag-works?page=5 Rfid tags.
demonstrated that multi-touch technology has [10] Hyperterminal
become affordable. The precision, reliability and http://help.expedient.net/dialup/hypertermin
responsiveness of a multi-touch table depends on the al.shtml
used hardware. Because of the use of a camera based [11] Configuration
multi-touch technology, ambient light has a large http://www.avitresearch.co.uk/USBTTL/hy
influence in the tracking performance. Compared to perterminal.html
desktop applications, users were able to manipulate [12] http://www.tradeindia.com/fp641264/Rfid-
objects in a natural way of touch. Instead of Reader-Kit-Rs232-Interface.html RFID
correcting the entire camera image, it is also possible reader kit with RS 232 interface
to apply position correction on the output of the blob
tracker. Currently image processing is done on the
CPU. In order to reduce the load on the CPU it is
possible to use graphics processing units (GPU) for
image processing. The current blob tracker used in
Touchlib is not scalable. Depending on the used
hardware, Touchlib will fail to track fifty or more
blobs in real-time. A smarter algorithm would not
only take the distance into account but also the
region and direction of a blob. It would also be
interesting to use the GPU for blob tracking. Based
on our own experiences the touch surface should be
improved. The friction with the acrylic makes it hard
to use the system for a longer period of time.
ACKNOWLEDGMENTS
This research project would not have been
possible without the support of many people. The
author wishes to express his gratitude to his
supervisor, Prof.C.Malathy of Computer Science and
Engineering Department who was abundantly
helpful and offered invaluable assistance, support
and guidance. The author wishes to express his love
and gratitude to his beloved families for their
understanding & endless love, through the duration
of his studies.
REFERENCES
[1] Han, J.: Low-cost multi-touch sensing
through frustrated total internal reflection.
In: UIST ‟05: Proceedings of the 18th
annual ACM symposium on User interface
software and technology, New York, ACM
Press (2005) 115–118.
[2] RFID :A Technical Overview and its
application to the enterprise by Ron
Weinstein.
[3] Jefferson Y.Han Multi-touch Interaction
wall In Siggraph ‟06:ACM Siggraph 2006
Emerging technologies.
[4] Jazz Mutant .Lemur Input Device.2006
[5] Didier Brun .Mouse Gesture Recognition
2007 URL http://www.bytearray.org/?p=91
503 | P a g e