As a core component of the Internet of Things technology (IoT), Radio Frequency Identification
(RFID) tagged items will add billions, perhaps trillions, of objects to the Internet. As a result,
uses of Ultra High Frequency (UHF) RFID sensing become massive ranging from logistics,
retail and healthcare to homes and even entire smart cities. Under this trend, mobile UHF
RFID scanners also need to evolve. Consumers will interact with their surroundings via tagged
RFID items taking full advantage of the advancing IoT. For mainstream consumer smartphones,
unfortunately, UHF RFID connectivity has yet to be fully integrated. The major challenges are:
1) the compatibility of an RFID reader module to the host platform, 2) Radio Frequency (RF)
signal coexistence interference between the RFID reader and other sensor/RF technologies, and
3) the unacceptable high current drain caused by RFID active scanning. In this paper, we
present a design and implementation of a novel modular UHF RFID scanning subsystem, the
UHF RFID reader module, on a Motorola Moto-Z smartphone. This module is fully integrated
with an Android 7.0 Operating System (OS) and directly interconnects with the low-level
smartphone hardware and software framework. With the new antenna design and the signal
spectrum analysis, we guarantee the RF isolation of the Mod with the smartphone’s other native
wireless components and sensors. Our design and implementation also address the current
drain issue and extends the battery life of Moto-Z smartphone up to 30.4 hours with IoT RFID
scanning.
PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONSCNRFID
This document provides an overview of privacy impact assessments (PIAs) for radio frequency identification (RFID) and wireless applications. It discusses the history and development of PIA frameworks for RFID technologies in Europe. Key events included the European Commission's recommendations on implementing privacy and data protection principles for RFID applications. Standards organizations developed techniques for conducting PIAs, including a standardized risk assessment methodology. The document aims to help RFID operators understand how to undertake a PIA and evaluate privacy risks for new wireless and RFID applications.
Wireless sensor networks using RFID techniques have the potential to provide remote monitoring capabilities that can benefit various applications. They are simpler to deploy than wired solutions and can enable improved understanding of processes through continual monitoring. This project will present the evolution of wireless sensor networks and provide examples of implementations in a vehicle tracking and ticketing system designed for a college bus.
Abstract of the Vehicle Tracking and Ticketing System (VTTS) using RFIDHari
This project aims to present the evolution of wireless sensor networks using RFID techniques. It will use examples of implementing RFID in a vehicle tracking and ticketing system for college buses. RFID is an exciting technology that can increase efficiencies and improve profitability by providing individual serial numbers for items that can be read from a distance of several meters. The system will enable improved monitoring of processes through continual monitoring using wireless sensors.
The document provides an overview of RFID (radio frequency identification) technology and applications. It discusses how RFID systems work and are composed of RFID tags and readers. RFID tags can be attached to objects and products to uniquely identify them. Readers then detect and read tags within their range through radio frequency communication. The document outlines several potential applications of RFID technology in areas like manufacturing, supply chain management, retail, and security. It also examines RFID technical components and standards as well as addressing challenges like tag collisions when multiple tags are read simultaneously.
Near field communication (NFC) allows short-range wireless data transfer when devices are brought close together. NFC grew out of RFID technology and was standardized in 2004. It can operate in passive or active mode at 13.56 MHz and up to 424 kbit/s. NFC is used for contactless payments, data sharing, and access in transit systems. While slower than Bluetooth, NFC consumes less power and sets up connections faster. Major trials of NFC payments and ticketing have occurred in several countries. Security relies on encryption and the NFC Forum standardizes protocols. Widespread adoption of NFC in mobile phones is expected in coming years.
The document analyzes patents related to wireless communication technologies including 4G LTE, WiFi, WPAN, NFC, RFID, and mobile IoT. It identifies the most prolific patent holders for each technology by analyzing patents granted by the USPTO and their essentiality to relevant standards. For 4G LTE, LG has the most patents followed by Samsung and Qualcomm. For WiFi, Marvell has the most patents followed by Intel and Samsung. For other technologies the top patent holders include Broadcom, Sony, Round Rock Research, and Nokia.
Bluetooth is a short-range wireless technology that allows data exchange between fixed and mobile devices over short distances. It uses radio waves in the 2.4 GHz band and supports data rates of up to 1 Mbps within a 10 meter range. Bluetooth devices can form piconets with one device acting as the master to multiple slaves, or scatternets by interconnecting multiple piconets. Common applications include wireless headsets, file transfers between devices, and connecting peripherals like keyboards and mice. Advantages are wireless connectivity, low power usage, and avoidance of interference through frequency hopping. Limitations include short range and lower security compared to other wireless standards. Future versions aim to improve speed, range, and support larger networks.
Near Field Communication (NFC) allows data exchange between devices less than 4 cm apart using radio frequency identification (RFID) technology. NFC combines the functionality of smartcards and readers into single devices that can communicate with existing contactless infrastructure for payments and transportation. Key use cases for NFC include emulating contactless cards, reading passive RFID tags, and device-to-device communication for applications like mobile payments, ticketing, electronic money transfers, and identity documents. The NFC Forum provides support and resources for developers to create interoperable products and applications using NFC technology.
PRIVACY IMPACT ASSESSMENT (PIA) FOR RFID AND WIRELESS APPLICATIONSCNRFID
This document provides an overview of privacy impact assessments (PIAs) for radio frequency identification (RFID) and wireless applications. It discusses the history and development of PIA frameworks for RFID technologies in Europe. Key events included the European Commission's recommendations on implementing privacy and data protection principles for RFID applications. Standards organizations developed techniques for conducting PIAs, including a standardized risk assessment methodology. The document aims to help RFID operators understand how to undertake a PIA and evaluate privacy risks for new wireless and RFID applications.
Wireless sensor networks using RFID techniques have the potential to provide remote monitoring capabilities that can benefit various applications. They are simpler to deploy than wired solutions and can enable improved understanding of processes through continual monitoring. This project will present the evolution of wireless sensor networks and provide examples of implementations in a vehicle tracking and ticketing system designed for a college bus.
Abstract of the Vehicle Tracking and Ticketing System (VTTS) using RFIDHari
This project aims to present the evolution of wireless sensor networks using RFID techniques. It will use examples of implementing RFID in a vehicle tracking and ticketing system for college buses. RFID is an exciting technology that can increase efficiencies and improve profitability by providing individual serial numbers for items that can be read from a distance of several meters. The system will enable improved monitoring of processes through continual monitoring using wireless sensors.
The document provides an overview of RFID (radio frequency identification) technology and applications. It discusses how RFID systems work and are composed of RFID tags and readers. RFID tags can be attached to objects and products to uniquely identify them. Readers then detect and read tags within their range through radio frequency communication. The document outlines several potential applications of RFID technology in areas like manufacturing, supply chain management, retail, and security. It also examines RFID technical components and standards as well as addressing challenges like tag collisions when multiple tags are read simultaneously.
Near field communication (NFC) allows short-range wireless data transfer when devices are brought close together. NFC grew out of RFID technology and was standardized in 2004. It can operate in passive or active mode at 13.56 MHz and up to 424 kbit/s. NFC is used for contactless payments, data sharing, and access in transit systems. While slower than Bluetooth, NFC consumes less power and sets up connections faster. Major trials of NFC payments and ticketing have occurred in several countries. Security relies on encryption and the NFC Forum standardizes protocols. Widespread adoption of NFC in mobile phones is expected in coming years.
The document analyzes patents related to wireless communication technologies including 4G LTE, WiFi, WPAN, NFC, RFID, and mobile IoT. It identifies the most prolific patent holders for each technology by analyzing patents granted by the USPTO and their essentiality to relevant standards. For 4G LTE, LG has the most patents followed by Samsung and Qualcomm. For WiFi, Marvell has the most patents followed by Intel and Samsung. For other technologies the top patent holders include Broadcom, Sony, Round Rock Research, and Nokia.
Bluetooth is a short-range wireless technology that allows data exchange between fixed and mobile devices over short distances. It uses radio waves in the 2.4 GHz band and supports data rates of up to 1 Mbps within a 10 meter range. Bluetooth devices can form piconets with one device acting as the master to multiple slaves, or scatternets by interconnecting multiple piconets. Common applications include wireless headsets, file transfers between devices, and connecting peripherals like keyboards and mice. Advantages are wireless connectivity, low power usage, and avoidance of interference through frequency hopping. Limitations include short range and lower security compared to other wireless standards. Future versions aim to improve speed, range, and support larger networks.
Near Field Communication (NFC) allows data exchange between devices less than 4 cm apart using radio frequency identification (RFID) technology. NFC combines the functionality of smartcards and readers into single devices that can communicate with existing contactless infrastructure for payments and transportation. Key use cases for NFC include emulating contactless cards, reading passive RFID tags, and device-to-device communication for applications like mobile payments, ticketing, electronic money transfers, and identity documents. The NFC Forum provides support and resources for developers to create interoperable products and applications using NFC technology.
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...NFC Forum
The NFC Forum Transport SIG acts as a bridge between all transport industry stakeholders, from identifying NFC roadblocks
to enabling a seamless integration of NFC by providing all players with the information and tools they need to succeed. Significant progress has been made with harmonization efforts over the past year. This presentation by the NFC Forum Transport SIG provides an overview of where we are to date, where we are heading, and how your organization can get involved with our efforts to advance the adoption of NFC in public transport.
Abstract and List of Charts for Vehicle Tracking and Ticketing System Using ...Hari
The document contains lists of charts, diagrams, figures and tables related to RFID technologies and their applications. It also includes an abstract that discusses using RFID techniques to create a wireless sensor network for vehicle tracking and ticketing system (VTTS) designed for a college bus passenger system. The network will provide remote monitoring capabilities to benefit applications such as industrial control, environmental monitoring and defense.
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTponraj leo
This document provides an overview of RFID technology and its role in enabling the Internet of Things (IoT). It defines RFID and how it works using tags and readers. It describes the architecture of IoT systems with perception, network and service layers. It outlines applications of RFID such as in healthcare, transportation and access control. Challenges of RFID like collision problems and security issues are also discussed. The document concludes that RFID and IoT will define the future through connecting objects and providing intelligent systems.
New use cases thanks to adding crypto to RFID tagsIhar Bayarenka
Presentation from technology seminar in Jakarta, Feb 2017. Describing new use cases that are made possible when cryptographic authentication is added to long range RFID tags in HF and UHF frequency bands (ICODE DNA and UCODE DNA, respectively)
"Combinando NFC y Datos en la Etiqueta RFID para Apoyar AAL" presentada por D...3JornadasRFID
This document proposes a system called CareTwitter that uses NFC and RFID tags to improve data management in elderly care centers. RFID tags are used as portable databases to store care logs for each resident. When a staff member interacts with a resident's RFID wristband using an NFC mobile phone, the care log is updated on the tag. CareTwitter also exports care logs to Twitter to keep friends and family updated on residents' daily activities. The system aims to enhance data gathering and sharing in challenging care center environments.
Near Field Communication (NFC) allows contactless communication between devices within close proximity. Google Wallet uses NFC to allow users to store credit cards on their phones and make mobile payments at participating retailers with a tap of their phone. However, implementing mobile payments faces technical challenges regarding mobile security, interoperability between platforms, and infrastructure requirements that may delay widespread adoption, especially in developing countries like India with less mobile connectivity.
The document provides an overview of an upcoming presentation on RFID/NFC security. It begins with introducing the speaker and their background and experience. The presentation agenda is then outlined and will cover topics such as what is and isn't true about RFID, real-life examples of RFID/NFC usage, RFID hardware including tags and readers, software like LibNFC, and specific RFID protocols and formats like iClass and Mifare Classic. Motivation for the talk is cited as coming from a book on the hacker ethic and sharing skills with a technical community.
Near Field Communication (NFC) is a short-range wireless technology that allows data transmission between devices that are close together. NFC was created in 2003 and uses radio waves at 13.56 MHz to transmit data by reading passive tags. NFC offers simple and intuitive data transfer between electronic devices like smartphones and is compatible with existing RFID infrastructure through standards. NFC devices can both receive and transmit data and have applications like contactless payments, device pairing, and access control. The technology empowers users but implementation costs and security are weaknesses to consider.
This document provides an overview of the ACR128 Dual Interface Reader. It is a multi-application reader that supports both contact and contactless smart card interfaces. The reader features include support for ISO7816 and ISO14443 card protocols, integrated SAM and ICC interfaces, USB connectivity, firmware upgradeability, and power saving modes. It can be used for applications such as access control, e-purse payments, campus management, transportation, and e-passports.
This document discusses NFC (Near Field Communication) technology. It explains that NFC allows short-range wireless communication when devices are tapped together from up to 20 centimeters. NFC uses magnetic field induction and operates at 13.56 MHz. Common applications include mobile payments, data sharing, and access control. The document outlines how NFC works, provides examples of its applications, and discusses its technical features and future potential.
Near Field Communication (NFC) is a short-range wireless technology that allows data exchange between devices over 10cm. The document discusses NFC technology, uses, tag types, communication modes, and its role in mobile commerce. It also examines standards, actors like TSMs, and the future potential of NFC in areas like mobile payments, ticketing, and as an alternative to physical payment cards.
Need NFC RFID-Tomorrow Is Today in This Constant State of InnovationHamed M. Sanogo
This document discusses near-field communications (NFC) and radio frequency identification (RFID) technology. It proposes using the Maxim Integrated MAX66242 chip, a secure dual-interface passive tag, to easily add contactless NFC/RFID capabilities to embedded electronic products. The MAX66242 uses SHA-256 encryption and challenge-response authentication to securely transfer data between a reader and tag. It also allows for data protection and limiting tag usage through various memory protection modes. Overall, the document promotes using NFC/RFID technology and the MAX66242 chip to enable new wireless capabilities and applications for portable electronic devices.
RFID technologies and the Internet of Things (IoT) allow physical objects to be tracked and connected digitally. RFID uses wireless microchips and readers to identify objects without line-of-sight. The IoT connects physical things to the internet, enabling them to send and receive data and interact autonomously. Together, RFID and the IoT have applications in areas like supply chain management, healthcare, transportation, and infrastructure monitoring. These technologies are driving the connection of trillions of smart devices as physical and digital worlds converge.
NFC is a short-range wireless technology that allows data exchange when devices are touched or brought within close proximity. It uses magnetic field induction to enable communication between devices operating within a 10cm range. NFC standards have been developed for identification cards and RFID communication. Common uses of NFC include contactless payments, data sharing between devices, and pairing devices via Bluetooth or WiFi setup. Security aspects of NFC include risks of eavesdropping, data modification, and unauthorized access if an NFC device is lost. Future applications may involve using NFC for vehicle ignition and unlocking smart doors.
The Google Nexus S offers support for Near Field Communication (NFC), an extension to an RFID smart card protocol popularly used for secure access, metro passes (Oyster/Clipper), and electronic money (FeliCa/Octopus). NFC in smartphones promises adding these features to the phone you carry by allowing the it to emulate both RFID tag and reader.
NFC additionally adds new capabilities like exchanging configuration data such as WiFi settings, trading vCard contact information, reading URLs, triggering SMS text messages or initiating calls, and secure bi-directional communication between NFC devices.
This session will cover what NFC and RFID is and is not, what Android on the Nexus S is currently capable of, and some examples of how to add NFC to your apps.
http://where2conf.com/where2011/public/schedule/detail/18443
The document discusses RFID technology, including how it works, its benefits and threats, and security considerations. RFID uses radio waves to read tags attached to objects without needing direct contact or line-of-sight. There are two types of tags - active tags with batteries and passive tags without. The document outlines security risks like spoofing, replay attacks, and unauthorized tracking. It emphasizes the need for lightweight cryptography and random number generation on tags to address security challenges in RFID systems.
NFC security guard systems allow tracking of security guard routes using NFC technology. Guards scan NFC tags at stations to log their locations and times. This allows monitoring of guard routes. The system was tested tracking guards at a historic waterfront area in Malta. A second project involved using similar NFC tracking for employees at a large brewery in Malta.
Functional phones are needed for lone workers to improve safety. Phones used should have GPS, an alarm button, long battery life, waterproofing and shock resistance. An example phone meeting these needs was presented. Applications could include GPS tracking, automated check-ins, and triggering an audio alarm if no motion is detected for 10 minutes to request help.
Introduction to the Interoperability InitiativeNFC Forum
Key take-aways of the NFC Forum – Introduction to the Interoperability Initiative presentation:
• RF Interoperability with mobile Public Transport Services is a reality
• All certified NFC-enabled mobile devices will work with Public Transport systems
• NFC Forum is leading the interoperability efforts.
This presentation was delivered at the APTA Annual Conference by Dr. Joerg Schmidt, Co-chair of NFC Forum Transport Special Interest Group (SIG)
For more info visit: http://nfc-forum.org/nfc-and-transport/
Near Field Communication (NFC) allows devices to establish radio communication by bringing them into close proximity or by touching them together. NFC can transfer data between devices quickly and easily. Some applications of NFC include mobile payments, ticketing, money transfers, and paying bills. While NFC has a shorter range and lower data transfer rate than Bluetooth, it does not require pairing devices or entering security codes. NFC is designed for intuitive, simple and safe communication between electronic devices.
An Electronic Ticketing System based on Near Field Communication for Concerts...Hussain Shah
NFC allows for short-range wireless communication between electronic devices like smartphones and payment terminals. It enables contactless transactions where users simply tap or touch their device to complete payments or data transfers. While NFC adoption has been limited, standards coordination by groups like the NFC Forum aim to address this by ensuring interoperability. NFC provides benefits like intuitive interactions, versatility across industries, and built-in security due to its short operating range. However, challenges remain around mass adoption including the need for industry collaboration between different players in the mobile ecosystem.
RFID Technology: An Upgradation for SocietyIRJET Journal
This document discusses the potential uses and benefits of RFID (radio-frequency identification) technology in society. It begins by introducing RFID and its increasing integration with IoT devices. It then describes some limitations of existing barcode and QR code systems. The document outlines how RFID tags work and can be used with IoT to develop applications like automated toll collection systems, smart shopping, vehicle localization without GPS, and contactless payment systems. It argues that RFID systems can make various processes more efficient and improve quality of life by streamlining tasks like shopping, transportation, and access control. Overall, the document promotes RFID technology as a useful upgrade for modern society.
3.[13 21]framework of smart mobile rfid networksAlexander Decker
This document discusses smart mobile RFID networks. It begins by describing typical RFID networks as defined by EPCglobal, noting that RFID networks need to provide value-added services for better supply chain visibility. The document then discusses how mobile RFID, using a mobile phone as an RFID reader, can provide new valuable services by integrating RFID and sensor networks with mobile communication. Finally, the document proposes "smart RFID networks" that can provide complex services like alerting subscribers when inventory ages or becomes stale.
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...NFC Forum
The NFC Forum Transport SIG acts as a bridge between all transport industry stakeholders, from identifying NFC roadblocks
to enabling a seamless integration of NFC by providing all players with the information and tools they need to succeed. Significant progress has been made with harmonization efforts over the past year. This presentation by the NFC Forum Transport SIG provides an overview of where we are to date, where we are heading, and how your organization can get involved with our efforts to advance the adoption of NFC in public transport.
Abstract and List of Charts for Vehicle Tracking and Ticketing System Using ...Hari
The document contains lists of charts, diagrams, figures and tables related to RFID technologies and their applications. It also includes an abstract that discusses using RFID techniques to create a wireless sensor network for vehicle tracking and ticketing system (VTTS) designed for a college bus passenger system. The network will provide remote monitoring capabilities to benefit applications such as industrial control, environmental monitoring and defense.
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTponraj leo
This document provides an overview of RFID technology and its role in enabling the Internet of Things (IoT). It defines RFID and how it works using tags and readers. It describes the architecture of IoT systems with perception, network and service layers. It outlines applications of RFID such as in healthcare, transportation and access control. Challenges of RFID like collision problems and security issues are also discussed. The document concludes that RFID and IoT will define the future through connecting objects and providing intelligent systems.
New use cases thanks to adding crypto to RFID tagsIhar Bayarenka
Presentation from technology seminar in Jakarta, Feb 2017. Describing new use cases that are made possible when cryptographic authentication is added to long range RFID tags in HF and UHF frequency bands (ICODE DNA and UCODE DNA, respectively)
"Combinando NFC y Datos en la Etiqueta RFID para Apoyar AAL" presentada por D...3JornadasRFID
This document proposes a system called CareTwitter that uses NFC and RFID tags to improve data management in elderly care centers. RFID tags are used as portable databases to store care logs for each resident. When a staff member interacts with a resident's RFID wristband using an NFC mobile phone, the care log is updated on the tag. CareTwitter also exports care logs to Twitter to keep friends and family updated on residents' daily activities. The system aims to enhance data gathering and sharing in challenging care center environments.
Near Field Communication (NFC) allows contactless communication between devices within close proximity. Google Wallet uses NFC to allow users to store credit cards on their phones and make mobile payments at participating retailers with a tap of their phone. However, implementing mobile payments faces technical challenges regarding mobile security, interoperability between platforms, and infrastructure requirements that may delay widespread adoption, especially in developing countries like India with less mobile connectivity.
The document provides an overview of an upcoming presentation on RFID/NFC security. It begins with introducing the speaker and their background and experience. The presentation agenda is then outlined and will cover topics such as what is and isn't true about RFID, real-life examples of RFID/NFC usage, RFID hardware including tags and readers, software like LibNFC, and specific RFID protocols and formats like iClass and Mifare Classic. Motivation for the talk is cited as coming from a book on the hacker ethic and sharing skills with a technical community.
Near Field Communication (NFC) is a short-range wireless technology that allows data transmission between devices that are close together. NFC was created in 2003 and uses radio waves at 13.56 MHz to transmit data by reading passive tags. NFC offers simple and intuitive data transfer between electronic devices like smartphones and is compatible with existing RFID infrastructure through standards. NFC devices can both receive and transmit data and have applications like contactless payments, device pairing, and access control. The technology empowers users but implementation costs and security are weaknesses to consider.
This document provides an overview of the ACR128 Dual Interface Reader. It is a multi-application reader that supports both contact and contactless smart card interfaces. The reader features include support for ISO7816 and ISO14443 card protocols, integrated SAM and ICC interfaces, USB connectivity, firmware upgradeability, and power saving modes. It can be used for applications such as access control, e-purse payments, campus management, transportation, and e-passports.
This document discusses NFC (Near Field Communication) technology. It explains that NFC allows short-range wireless communication when devices are tapped together from up to 20 centimeters. NFC uses magnetic field induction and operates at 13.56 MHz. Common applications include mobile payments, data sharing, and access control. The document outlines how NFC works, provides examples of its applications, and discusses its technical features and future potential.
Near Field Communication (NFC) is a short-range wireless technology that allows data exchange between devices over 10cm. The document discusses NFC technology, uses, tag types, communication modes, and its role in mobile commerce. It also examines standards, actors like TSMs, and the future potential of NFC in areas like mobile payments, ticketing, and as an alternative to physical payment cards.
Need NFC RFID-Tomorrow Is Today in This Constant State of InnovationHamed M. Sanogo
This document discusses near-field communications (NFC) and radio frequency identification (RFID) technology. It proposes using the Maxim Integrated MAX66242 chip, a secure dual-interface passive tag, to easily add contactless NFC/RFID capabilities to embedded electronic products. The MAX66242 uses SHA-256 encryption and challenge-response authentication to securely transfer data between a reader and tag. It also allows for data protection and limiting tag usage through various memory protection modes. Overall, the document promotes using NFC/RFID technology and the MAX66242 chip to enable new wireless capabilities and applications for portable electronic devices.
RFID technologies and the Internet of Things (IoT) allow physical objects to be tracked and connected digitally. RFID uses wireless microchips and readers to identify objects without line-of-sight. The IoT connects physical things to the internet, enabling them to send and receive data and interact autonomously. Together, RFID and the IoT have applications in areas like supply chain management, healthcare, transportation, and infrastructure monitoring. These technologies are driving the connection of trillions of smart devices as physical and digital worlds converge.
NFC is a short-range wireless technology that allows data exchange when devices are touched or brought within close proximity. It uses magnetic field induction to enable communication between devices operating within a 10cm range. NFC standards have been developed for identification cards and RFID communication. Common uses of NFC include contactless payments, data sharing between devices, and pairing devices via Bluetooth or WiFi setup. Security aspects of NFC include risks of eavesdropping, data modification, and unauthorized access if an NFC device is lost. Future applications may involve using NFC for vehicle ignition and unlocking smart doors.
The Google Nexus S offers support for Near Field Communication (NFC), an extension to an RFID smart card protocol popularly used for secure access, metro passes (Oyster/Clipper), and electronic money (FeliCa/Octopus). NFC in smartphones promises adding these features to the phone you carry by allowing the it to emulate both RFID tag and reader.
NFC additionally adds new capabilities like exchanging configuration data such as WiFi settings, trading vCard contact information, reading URLs, triggering SMS text messages or initiating calls, and secure bi-directional communication between NFC devices.
This session will cover what NFC and RFID is and is not, what Android on the Nexus S is currently capable of, and some examples of how to add NFC to your apps.
http://where2conf.com/where2011/public/schedule/detail/18443
The document discusses RFID technology, including how it works, its benefits and threats, and security considerations. RFID uses radio waves to read tags attached to objects without needing direct contact or line-of-sight. There are two types of tags - active tags with batteries and passive tags without. The document outlines security risks like spoofing, replay attacks, and unauthorized tracking. It emphasizes the need for lightweight cryptography and random number generation on tags to address security challenges in RFID systems.
NFC security guard systems allow tracking of security guard routes using NFC technology. Guards scan NFC tags at stations to log their locations and times. This allows monitoring of guard routes. The system was tested tracking guards at a historic waterfront area in Malta. A second project involved using similar NFC tracking for employees at a large brewery in Malta.
Functional phones are needed for lone workers to improve safety. Phones used should have GPS, an alarm button, long battery life, waterproofing and shock resistance. An example phone meeting these needs was presented. Applications could include GPS tracking, automated check-ins, and triggering an audio alarm if no motion is detected for 10 minutes to request help.
Introduction to the Interoperability InitiativeNFC Forum
Key take-aways of the NFC Forum – Introduction to the Interoperability Initiative presentation:
• RF Interoperability with mobile Public Transport Services is a reality
• All certified NFC-enabled mobile devices will work with Public Transport systems
• NFC Forum is leading the interoperability efforts.
This presentation was delivered at the APTA Annual Conference by Dr. Joerg Schmidt, Co-chair of NFC Forum Transport Special Interest Group (SIG)
For more info visit: http://nfc-forum.org/nfc-and-transport/
Near Field Communication (NFC) allows devices to establish radio communication by bringing them into close proximity or by touching them together. NFC can transfer data between devices quickly and easily. Some applications of NFC include mobile payments, ticketing, money transfers, and paying bills. While NFC has a shorter range and lower data transfer rate than Bluetooth, it does not require pairing devices or entering security codes. NFC is designed for intuitive, simple and safe communication between electronic devices.
An Electronic Ticketing System based on Near Field Communication for Concerts...Hussain Shah
NFC allows for short-range wireless communication between electronic devices like smartphones and payment terminals. It enables contactless transactions where users simply tap or touch their device to complete payments or data transfers. While NFC adoption has been limited, standards coordination by groups like the NFC Forum aim to address this by ensuring interoperability. NFC provides benefits like intuitive interactions, versatility across industries, and built-in security due to its short operating range. However, challenges remain around mass adoption including the need for industry collaboration between different players in the mobile ecosystem.
RFID Technology: An Upgradation for SocietyIRJET Journal
This document discusses the potential uses and benefits of RFID (radio-frequency identification) technology in society. It begins by introducing RFID and its increasing integration with IoT devices. It then describes some limitations of existing barcode and QR code systems. The document outlines how RFID tags work and can be used with IoT to develop applications like automated toll collection systems, smart shopping, vehicle localization without GPS, and contactless payment systems. It argues that RFID systems can make various processes more efficient and improve quality of life by streamlining tasks like shopping, transportation, and access control. Overall, the document promotes RFID technology as a useful upgrade for modern society.
3.[13 21]framework of smart mobile rfid networksAlexander Decker
This document discusses smart mobile RFID networks. It begins by describing typical RFID networks as defined by EPCglobal, noting that RFID networks need to provide value-added services for better supply chain visibility. The document then discusses how mobile RFID, using a mobile phone as an RFID reader, can provide new valuable services by integrating RFID and sensor networks with mobile communication. Finally, the document proposes "smart RFID networks" that can provide complex services like alerting subscribers when inventory ages or becomes stale.
IRJET- Development and Implementation of Smart RFID based Library Managem...IRJET Journal
This document describes the development and implementation of a smart RFID-based library management system using Raspberry Pi and μFR Nano RFID technology with an Android operating system. Key aspects of the system include a μFR Nano RFID reader/writer operating at 13.56 MHz to identify books and member cards tagged with RFID chips. Software was created using the Android Studio development environment and utilizes a SQLite database on the Raspberry Pi to store and retrieve book and member information. The system was tested successfully at the authors' university library to automate issuing, returning, and searching of books through contactless identification of RFID tags.
IRJET-Major Challenges in Adoption of RFID for Indian SME’sIRJET Journal
The document discusses major challenges in adopting radio frequency identification (RFID) technology for small and medium enterprises (SMEs) in India. It analyzes the current state of RFID usage through a survey and literature review. Using analytical hierarchy process, the study evaluates the key challenges that hinder RFID implementation in Indian industries. Standardization issues, security and privacy concerns, high costs, management commitment, technology support and selection of hardware and software are identified as major barriers. The document aims to identify research gaps in addressing challenges faced by developing countries like India in adopting this promising but still emerging technology.
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...IRJET Journal
The document proposes a system using NFC chips embedded in Indian currency to help identify black money and counterfeit currency. The NFC chips would contain identifying information like the currency value, tag number, and expiration date. The system uses four methods: 1) Money counting devices with NFC readers for offices/shops, 2) NFC readers that attach to Android phones for small businesses, 3) QR codes containing account details for vendors who can't afford readers, and 4) cashless transactions using cards. Together these allow the Reserve Bank of India to track all transactions and identify unreported income. The goal is to effectively eliminate black money and fake currency.
The document discusses Internet of Things (IoT) and spectrum needs for IoT. It provides definitions of IoT from various organizations and describes key characteristics of IoT communications. It outlines the spectrum ranges used by different IoT technologies, both in licensed and unlicensed bands. It discusses spectrum needs for IoT based on application requirements and deployment scenarios. It also summarizes outcomes of WRC-15 related to identification of additional spectrum for mobile broadband and IMT, and issues to be studied at WRC-19 regarding spectrum needs for 5G and IMT-2020.
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure.infrastructure is one such technology which enables the Internet of things.When the RFID readers abides by appropriate communication protocols and are connected to the terminal of Internet, the readers distributed throughout the world can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IOT).
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESIRJET Journal
This document discusses Near Field Communication (NFC) technology, including its vulnerabilities and potential countermeasures. It provides an overview of NFC, describing its operating modes and applications. It then examines various types of attacks on NFC systems, such as those affecting integrity, confidentiality, and availability. Experimental analysis was conducted to evaluate vulnerabilities. The document also proposes countermeasures like encrypting data and authenticating NFC devices to enhance security. Specific measures for data corruption and denial of service attacks include detecting abnormal data transmissions and establishing secure channels.
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
This document summarizes an RFID and Zigbee-based indoor campus inventory tracking system. It describes how RFID tags attached to objects can be identified and tracked using RFID readers. Zigbee modules are used to wirelessly transmit inventory data from the readers to a central server. The system uses passive RFID tags powered by electromagnetic fields from readers. When a tagged object enters the read range, its data is transmitted via Zigbee to allow centralized tracking of inventory across a campus.
This document discusses building a software defined radio (SDR) simulation environment for radio frequency identification (RFID) applications. It first introduces RFID technology and SDR. It then describes the methodology, which includes generating test data, transmitting the data using quadrature amplitude modulation (QAM) over an additive white Gaussian noise channel to simulate a RFID reader-tag communication, and comparing the bit error rate (BER) performance at different signal-to-noise ratios (SNR) and carrier frequencies. The results show that 128 kHz achieved the lowest BER of 0.105% compared to higher BERs at 32 kHz and 64 kHz. Therefore, 128 kHz is preferable for QAM modulation in this RFID SDR simulation environment
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...IRJET Journal
This document describes a proposed smart campus system that uses Internet of Things (IoT), Near Field Communication (NFC) technology, and face recognition to manage campus activities more efficiently. The system aims to address common problems in campus administration by automating tasks like student attendance tracking, marks reporting, smart teaching, video surveillance, and notifications. It would allow students and faculty to perform activities like accessing classrooms and equipment or purchasing items using their NFC cards and face detection. All user and activity data would be stored securely in the cloud. The system is intended to improve the quality of education and make campus operations more time-efficient through contactless technologies and integrated mobile and web applications.
Internet of Things (IoT) Applicability in a Metropolitan CityEswar Publications
Internet of Things (IoT)is defined here as a network of interconnected objects. These objects can include several
technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically
feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a
concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in
supporting the metropolitan needs in San Antonio, Texas.
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
The document describes an RFID-based bike rental system that uses miniDES encryption on RFID tags to securely store bike identifiers. Key points:
1) RFID tags attached to bikes are encrypted with miniDES to securely store bike IDs readable only by authenticated readers.
2) A microcontroller decrypts tag data and verifies bike IDs, recording check-out and check-in times from an RTC to calculate rental fees.
3) .NET software receives bike data from the microcontroller via serial to manage a database of bike statuses, rental fees, and a web portal interface.
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
RFID tags are used to automate a bike renting system. Each bike is tagged with a passive RFID tag storing a unique ID encrypted with the miniDES algorithm. RFID readers scan the tags and send the encrypted IDs to a microcontroller for decryption and authentication. The microcontroller verifies the IDs and records rental data like user, bike ID, and timestamps which is sent to a backend database for management and reporting. The miniDES algorithm provides lightweight encryption suitable for the low-power RFID tags and embedded systems used while ensuring security of rental transactions.
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
The document describes an RFID-based bike rental system that uses miniDES encryption on RFID tags to securely store bike identifiers. Key points:
1) RFID tags attached to bikes are encrypted with miniDES to securely store bike IDs readable only by authenticated readers.
2) A microcontroller decrypts tag data and tracks bike check-ins/check-outs using a real-time clock, communicating data to a .NET application.
3) The .NET system calculates rental charges, displays bike statuses on a web portal, and allows editing rental amounts. This automates the bike rental process using RFID technology and encryption.
This document summarizes an RFID-based vehicle tracking system implemented by STS Technology for the Municipality of Pendik in Istanbul, Turkey. The municipality had over 1,000 vehicles entering and exiting a parking lot through four gates. STS installed Alien RFID readers at each gate along with circular antennas. Each vehicle was outfitted with an Alien M RFID tag on the windshield. The system automatically tracks vehicle movements and generates reports, eliminating the need for human monitoring. It allows drivers to pass through gates without stopping. The municipality and STS were pleased with the success of the project and its ability to meet their needs for an automated solution.
International Journal of Business and Management Invention (IJBMI) inventionjournals
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Similar to IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING (20)
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
This document discusses using social media technologies to promote student engagement in a software project management course. It describes the course and objectives of enhancing communication. It discusses using Facebook for 4 years, then switching to WhatsApp based on student feedback, and finally introducing Slack to enable personalized team communication. Surveys found students engaged and satisfied with all three tools, though less familiar with Slack. The conclusion is that social media promotes engagement but familiarity with the tool also impacts satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The document proposes a blockchain-based digital currency and streaming platform called GoMAA to address issues of piracy in the online music streaming industry. Key points:
- GoMAA would use a digital token on the iMediaStreams blockchain to enable secure dissemination and tracking of streamed content. Content owners could control access and track consumption of released content.
- Original media files would be converted to a Secure Portable Streaming (SPS) format, embedding watermarks and smart contract data to indicate ownership and enable validation on the blockchain.
- A browser plugin would provide wallets for fans to collect GoMAA tokens as rewards for consuming content, incentivizing participation and addressing royalty discrepancies by recording
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This document discusses the importance of verb suffix mapping in discourse translation from English to Telugu. It explains that after anaphora resolution, the verbs must be changed to agree with the gender, number, and person features of the subject or anaphoric pronoun. Verbs in Telugu inflect based on these features, while verbs in English only inflect based on number and person. Several examples are provided that demonstrate how the Telugu verb changes based on whether the subject or pronoun is masculine, feminine, neuter, singular or plural. Proper verb suffix mapping is essential for generating natural and coherent translations while preserving the context and meaning of the original discourse.
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The document discusses automated penetration testing and provides an overview. It compares manual and automated penetration testing, noting that automated testing allows for faster, more standardized and repeatable tests but has limitations in developing new exploits. It also reviews some current automated penetration testing methodologies and tools, including those using HTTP/TCP/IP attacks, linking common scanning tools, a Python-based tool targeting databases, and one using POMDPs for multi-step penetration test planning under uncertainty. The document concludes that automated testing is more efficient than manual for known vulnerabilities but cannot replace manual testing for discovering new exploits.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
The document proposes a new validation method for fuzzy association rules based on three steps: (1) applying the EFAR-PN algorithm to extract a generic base of non-redundant fuzzy association rules using fuzzy formal concept analysis, (2) categorizing the extracted rules into groups, and (3) evaluating the relevance of the rules using structural equation modeling, specifically partial least squares. The method aims to address issues with existing fuzzy association rule extraction algorithms such as large numbers of extracted rules, redundancy, and difficulties with manual validation.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
2. 128 Computer Science & Information Technology (CS & IT)
2015 to 10.4 billion in 2016 [1]), its price becomes affordable [2], hence transforming common
everyday items of a wide variety, such as jeans or brushes, into IoT objects [3]. Likewise,
smartphone shipments have increased every year since 2006 with an estimated global market of
2.1 billion units shipped in 2021 [4]. With high-performance computing power and constant
Internet connectivity, nowadays smartphones are already capable to associate mobile computing
with the IoT [5]. Once equipped with a UHF RFID reader, a smartphone is able to interact with
the surrounding objects tagged by UHF RFID, gather and process information from those tags
locally or on the internet, then represent feedback to the user via its multimedia user interfaces.
However, to-date there has been no successful widespread deployment of a fully integrated UHF
RFID reader on mainstream smartphones. Common UHF RFID reader solutions are either stand-
alone devices or are deployed as add-on implementation on smartphones that are not fully
integrated with the hardware and software of a smartphone. For example, a UHF RFID reader on
microSD which can be inserted into a smartphone through external memory slot was developed in
[6]. Another solution utilizes the proprietary audio port to connect a UHF RFID reader with a
smartphone [7]. Current integrated solutions, such as Invengo XC-1003 mobile IoT device and
Chafon CF-H802 run on older Android platforms, are more industrial and are not widely
distributed [8], [9]. Moreover, since hardware and software of these devices are specially
designed, they are expensive and their functionality are monotonous. Through the research and
prototyping experience in our preliminary works, we have identified three major challenges that
causes this absence of RFID reader on a smartphone:
1) No existing interface that enables the UHF RFID reader to establish a direct high-speed
connection to the lower level smartphone hardware without significant modifications on
the phones hardware framework.
2) Severe signal interferences amongst different RF sensors and communication modules
while the RFID reader antenna is active.
3) Unbearable current drain to a consumer smartphone when the UHF RFID reader is up
and running.
In this work, we address the three challenges and empower a commercial smartphone with UHF
RFID reading capability. Specifically, we design and implement a fully functional consumer UHF
RFID Reader Mod (URRM), as illustrated in Fig. 1, based on a mainstream Android-driven
smartphone, Motorola Moto-Z, which has been ”sold around the world” [10]. By leveraging the
advantage of the unique modularization features of Moto-Z, i.e. the support of third-party Mods
[11], we are able to utilize the GreyBus protocol to connect our RFID reader module, i.e. the
Impinj RS500 RFID module, to the phones lower-level hardware framework without changing
the phones native hardware. Comparing to add-on implementations that connect through USB,
audio jack or memory card ports [9,10], direct connection to lower-level hardware framework
provides with high energy-efficiency, low communication overhead as well as wider applicable
system support such as power management or chip-level control and scheduling. To guarantee
URRMs RF performance and avoid interference with phones native wireless functionalities, we
design an antenna for the URRM which isolates to the phones native wireless signal system. We
further utilize the power-efficient sensor fusion core on the URRMs hardware infrastructure to
manage the scanning and data processing tasks. We minimize the impact of the high current drain
of RFID scanning to the phones battery life by optimizing the control and management system
and coupling to an external power source. Our experiments prove that our prototype overcomes
3. Computer Science & Information Technology (CS & IT) 129
these three challenges and hence becomes practical and ready-to-manufacture. In addition, our
design and implementation of the key hardware and software architecture is extensible and
scalable for continued research. Other IoT sensors on different mobile platforms, such as WiFi or
Bluetooth modules on NuttX-driven Rasperry Pi platforms, can also apply our solutions.
The rest of the paper is organized as follows. We discuss related work in Section II. Section III
presents the design and implementation of the portable UHF RFID reader architecture. In Section
IV we study the radio performance of the UHF RFID reader Mod with respect to signal isolation,
sensing range and sensitivity. We conclude in Section V.
2. RELATED WORK
The fast growing IoT technology and its expanding scope of applications demand for a wide
spectrum of both the sensor type and the sensing content [12]. In [13], researchers developed
CARISMA (Context-Aware Reflective Middleware System for Mobile Applications), a software
framework for IoT contextual sensing and awareness tasks on mobile systems. This framework is
generic with respect to mobile operation systems and sensor types, hence it can be implemented
on different smartphone platforms and work with different types of sensors. Similar middleware
system, the SOCAM (Service Oriented Context-Aware Middleware), was also developed by
researchers in [14]. To utilize the advantages of heterogeneous sensing sources in IoT scheme, the
e-SENSE [15] mobile sensing system enables ambient intelligence using wireless multi-sensor
networks for making IoT oriented context-rich information available to applications and services.
e-SENSE combines body sensor networks (BSN), object sensor networks (OSN), and
environment sensor networks (ESN) to capture context in the IoT paradigm. Later, Hydra3 [16]
was developed as an IoT middleware that aims to integrate wireless devices and sensors into
ambient intelligence systems. Hydra3 identifies context reasoning rule engine, context storage,
context querying, and event/action management as the key components of a context-aware
framework. In the IoT sensing scheme, RFID reader plays a key role. In [17], researchers
illustrate eleven different categories of use cases that need to utilize RFID technology to interact
with the IoT surroundings. In [18], researchers introduce a semi-passive, reconfigurable UHF RF
identification (RFID) sensing tag operating as the generic sensing platform (GSP). The tag is
highly configurable and can be dynamically switched between a Continuous data transmitting
platform (Online mode) or a Data logging platform (Offline mode). Researchers in [19] develop a
suite of web-based, user-level tools and applications designed to empower users by facilitating
their understanding, management, and control of personal RFID data and privacy settings.
Besides researches on RFID technology itself, research topics of implementing RFID based IoT
systems on other application fields, such as massive manufacture workflow optimization [20],
Geofencing item tracking [21] and industrial-level quality control [22], have drawn increasing
attention not just from computer developers and researchers, but from all the industrial and
science community. IoT is advancing fast, RFID and their combined technologies are also
becoming ubiquitous and playing a critical role of identifying objects. However, smartphones,
one of the most convenient and widely used portable computing devices, is still out of the picture
of research on RFID based IoT systems. Although it matches all the requirements from both the
hardware and the software perspective, severe RFID integration challenges remain.
4. 130 Computer Science & Information Technology (CS & IT)
3. SYSTEM DESIGN AND IMPLEMENTATION
The core concept of our system design is the URRM and its control and support components. In
particular, our system architecture design contains five subsystems: the UHF RFID reader Mod
(URRM) subsystem, the Mod control and management subsystem, the Mod support subsystem,
the Battery subsystem and the Antenna subsystem. The following subsections discuss the five
subsystems in details, followed by a discussion of the system workflow.
A. UHF RFID Reader Mod Subsystem
To embed a RFID reader module into the low-level of a native smartphone system, the major
challenge is to establish a physical connection from the RFID module directly to the low-level
smartphone system without significantly modifying the native system. We achieve this goal by
designing the URRM for a Moto Z smartphone, both of which are showed in Fig. 1, respectively.
In particular, we embedded the RFID reader module into the MotoMod platform [23] with a HAT
(Hardware Attached on Top) adapter board [24]. Due to the modularization design of the Moto-Z
mobile system, the URRM utilizes GreyBus [25] protocol to communicate the Moto Zs hardware
layer through Serial Peripheral Interface (SPI) once the URRM is attached to a Moto Zs
backboard. The picture and the brief architecture of the Moto-Z system and the URRM are
depicted in Fig.1(a) and Fig.1(b), respectively.
(a) MotoMod and Moto Z products (b) MotoMod and Moto Z structure
Fig. 1. Moto Mods and Moto Z
GreyBus is developed by Google and Motorola in 2014, it supports hot plug and play commu-
nications between the GreyBus Master and GreyBus Slave. The Moto Zs Mod physical hardware
interface contains 16 metal touch points which supports USB2.0, USB3.1, SPI, Mobility Display
Port (MyDP), Inter-IC Sound (I2S) and other mainstream communication protocols. Up to 15
Mps of high speed data exchange with a dedicated transmit and receive Direct Memory Accesses
(DMA) between Master and Slave devices. To drive up the reader module, we use Universal
Synchronous/Asynchronous Receiver/Transmitter (UsART) to port the reader Mod to the HAT
board. To improve the energy efficiency, we further design a two-layer architecture which utilizes
both the MuC on the MotoMod, i.e., the Mod Control and Management Subsystem, and the
Application Processor (AP) on the Moto-Z, i.e., the Mod Support subsystem, to control and
manage the RFID reader module jointly. Moto-Z smartphone system is equipped with a
5. Computer Science & Information Technology (CS & IT) 131
SnapDragon 820 CPU as its AP which has 2.2GHz main frequency and 512 KB + 1 MB L2
cache. It is designed to support the latest version of Android system, i.e., Android 8.0, and
smartphone applications. However, the current drain is high (28.8mA in full performance and
4.8mA in idle state). For scan-related tasks such as conducting IoT sensing or processing the raw
data, the AP is over-powerful and hence becomes very energy-inefficient. The MuC on the
MotoMod, on the other hand, has higher energy-efficiency (4.3mA current drain in full
performance and 1.1uA in idle state). This system is powered by a STM-32L4 based core that has
80MHz main frequency and 1MB flash memory. It’s computing capacity is less powerful
comparing to the AP, but it is sufficient to handle the scanning routings such as sending
commands or parsing events to or from the RFID module. In our stress test, the MuC can process
no less than 1200 RFID tags per second without depleting its computing power and buffer. In our
design, we keep computing and control oriented tasks of UHF RFID sensing, such as the
scanning routings or raw data process procedures, on the MCU and create the Mod Control and
Management subsystem. For tasks that can only run on Moto Z, such as the scan application with
Graphic User Interface (GUI), we shift them to the AP and create Mod support subsystem. Both
subsystems are discussed in the following two subsections.
B. Mod Control and Management Subsystem
The MuC and its baseline software framework [26] are the core components of the MotoMod
system and provide Mod developers a POSIX and ANSI standards develop environment. The
software framework is built upon a real-time operating system, the NuttX Real-time operation
system (NuttX) [27], to provide basic I/O control, task scheduler, power management and drivers
for specific circuits running on the MotoMod. In particular, the slave-end GreyBus protocol is
implemented in the NuttX driver layer and is abstracted as a virtual file. All the data
transmissions between Moto Z and MotoMod are implemented through reading or writing this
virtual file. The system architecture is illustrated in Fig.1(b).
Fig. 2. Sensor Fusion Architecture
6. 132 Computer Science & Information Technology (CS & IT)
To control the RFID reader module, we deploy the sensor fusion architecture modified from in
our previous works [28], [29], which is illustrated in Fig.2, on the baseline software framework.
The core components of the sensor fusion architecture are: Power Manager, Sensor Manager,
Algorithm Manager, Application Processor Interface and Wireless Manager. We specify their
functions separately.
Power Manager: responsible for managing the tasks power mode votes and configuring the
MuC’s power mode based on the votes. The power manager also controls and monitors the status
of the Mods battery.
Sensor Manager: responsible for configuring the sensors and managing the raw sensor data
obtained from the sensors.
Algorithm Manager: responsible for configuring, scheduling, and providing the raw sensor data
for all data processing algorithms.
Application Processor Interface: responsible for all communications between the sensor fusion
core and the application processor. Its tasks include managing features turned on/off by the
application processor, and interrupting applications when sensor data is available.
Wireless Manager: responsible for configuring the UHF RFID reader IC, and write/reading data
of surrounding UHF RFID tags.
The design of the Mod Control and Management subsystem has two advantages. First, the
architecture is extensible which means not only the RFID reader, but other similar wireless
technologies, such as Bluetooth, WiFi, and NFC, can be deployed on the Mod and can work
jointly following the same approach. Second, all the drivers and implementation details are
encapsulated on the MuC and are transparent to the smartphone, which means even a URRM with
different configurations, like with a different RFID reader module, is attached on, systems on the
smartphone are not affected.
C. Mod Support Subsystem
On the smartphone side, we design a vertical system framework running on Android system
which communicates through from the top (Application) layer of the Android system to the bot-
tom (GreyBus protocol over the SPI transport) layer of the smartphone system. All functionalities
of the whole framework are encapsulated and embedded with an API library, the Motlib, and are
exposed to the Androids application layer. Our application, as well as any other third-party
applications, utilizes the framework by simply including the Motlib library.
The architecture of the vertical system, including the Mod support subsystem and Mod control
and management subsystem, are illustrated in Fig.3. For the Mod support subsystem,each
component in this framework from top layer to bottom layer is discussed as follows:
RFID Application an Android application with a GUI that allows users to interact with the
URRM by sending commands and displaying the reader Mod status and scan results. This
application utilizes functions in the Motlib library to interact with the Mod Manager layer.
7. Computer Science & Information Technology (CS & IT) 133
Mod Manager: The Mod Manager is a component of the Hardware Abstract Layer (HAL) in the
NuttX system. It encapsulates the implementation details of hardware under NuttX and maps
system calls from the Application Layer to the device driver functionalities. In our case, the
URRM is registered to the Mod Manager with its all functionalities. Plus, Mod Manager can
directly update the firmware of the MuC in URRM.
Fig. 3. Architecture of URRM and Mod Support Subsystems
GreyBus Stack (master end): GreyBus is running on the Kernel layer of the Android system.
GreyBus defines multiple class protocols that are used to communicate and provide function to
specific hardware. In our design, we enable three protocols: RAW, Battery and Power Transfer
Protocol (PTP) which enable us to use our own designed communication package format (RAW),
enable URRM to manage its own battery (Battery) and enable Moto Z can provide power to
URRM (PTP).
SPI Driver: SPI Driver is running in the Android kernel. It controls the SPI Bus which is the
physical communication interface between the MotoMod and Moto-Z mobile device for GreyBus
communications to the MuC.
This design has two advantages. First, it allows Android applications to flash the MuC’s
firmware, either for driver updates or for upgrades of functionality, algorithms or even for the
baseline system. This feature brings more flexibility and convenience to the application developer
since without this function, such update or upgrade procedures can only be done manually by
opening up the Mods enclosure and flash new firmware through J-tag or CC-debugger that is
attached to the MuC. Second, the power management function in the Mod Support subsystem
allows us to embed the external power source in the URRM and enable URRM to gain power
supply from either the external power source or the Moto Z. The detailed implementation of the
external power source is discussed in the next subsection.
8. 134 Computer Science & Information Technology (CS & IT)
D. Battery Subsystem
In our design, the RFID Mods MuC is responsible for controlling the power management. We use
a MAX17050X chipset for monitoring the battery when in-use and charging. To maximize device
power when RFID scanning is active, we couple a regenerative 3.7 volt battery with a capacity of
1500 mAH in the RFID Mod with the Moto Z through the MuC controller. Total energy capacity
available is 5000 mAH when combined with Moto Z’s native battery capacity of 3500mAH.
Utilizing the MuC’s power management component, our configuration uses the Mods battery
until the battery level reaches 5%, at that point the MuC will switch in the Moto Zs battery for
continuous use ensuring no degradation in performance.
Fig. 4. Battery Life Evaluation
The method we use to measure the battery consumption is a NI USB-6251 DAQ to monitor
current consumption at the battery contacts of the Moto Z. Once the DAQ is connected, we place
the phone into an airplane mode to disable all wireless processing, and measure the current
consumption with the UHF RFID application launched but not on. This provides us the idle
screen current drain baseline measurement. We then enable the UHF RFID reader Mod. The
configuration of the scanning is 10sec on and 10sec idle. The results in Fig.4 show that our design
is capable of scanning for an entire day in the background. As we continue to develop and refine
existing algorithms we anticipate further reductions in battery consumption.
E. Antenna Subsystem
When active, the reader Mod actively project energy to the RFID receiver, such as RFID tags,
and capture their echoes as responses. Therefore, the performance of the reader as well as the
interference amongst other wireless communication modules could be severe and becomes one of
the main blockage for the deployment of RFID readers on smartphone platform. We provide our
antenna design here and will evaluate the antennas performance in the next section.
We design the antenna to operate at 902MHz-928MHz, and an ambient distance of one meter for
small passive tags, and three meters for active, or larger UHF RFID tags. We use Rogers 3010
material [30] to reduce the effects of increasing the Z height in our design. The antenna
dimensions are 80x52x1.2mm. The feed impedance of the antenna was 50 Ohms. The direction of
the antenna’s radiation is perpendicular to the Moto Z’s plane, and the polarization is across the
Moto Z’s antennas. The isolation between the UHF RFID antenna and the Moto Z’s
communication frequencies is larger than 30dB. The radiation efficiency of our design from
902MHz-928MHz was 5 - 10%.
9. Computer Science & Information Technology (CS & IT) 135
F. System Workflow
Once the UHF RFID reader Mod is attached to the back of the Moto Z, the Mod transmits its
manifest file from the MuC to the Motorola Mod Manager. The Motorola Mod Manager then
parses the manifest file and determines what type of Mod is connected and its communication
capabilities to expose for applications use. After the reader Mod is registered, applications can
use Motorola Mod Manager to send RFID commands over the RAW protocol to the Mod. Once
the reader Mod receives the RAW packet it will parse the data and determine which Manager
(Sensor, Algorithm, Wireless) gets the payload. The Manager will then determine which driver or
algorithm to send the payload. The driver or algorithm then parses the payload to perform the
requested action. Upon a completion of the requested action a returned status (success or failure)
is returned to the application.
4. URRM SIGNAL FREQUENCY ISOLATION ANALYSIS
As a part of the smartphone wireless system, the reader Mod works in a very close range with
other native sensors and wireless modules. Therefore, the radio signal interference becomes a key
feature which determines if the reader Mod is practical for commercial use or is just a prototype.
Moreover, the radio performance of the reader Mod is another key feature as a sensor that needs
to be evaluated, too short sensor range or too low sensitivity may significantly reduce the
applicable range of the reader Mod in real-world scenarios. In the following subsections, we
experimentally evaluate these two key features.
A. RF Signal Interference Validation
In Section I, we discuss about the antenna design in the hardware level that isolates the RFID
signal from other sensors. In specific, as antennas of different wireless components are tightly
coupled in a small enclosure, we need to confirm that our new RFID reader has no 1) Radiated
spurious emissions [31] and 2) Inter-modulation distortion [32], [33]) against the components in
the original system. In this section, we experimentally proof the signal isolation effectiveness of
our design from the radio spectrum perspective.
Our experiment testbed is setup as follow. We use a RF shielded box (Will Technology model
SH-120) to provide a signal-free environment and use two developer version Moto Z
smartphones to perform data transmission via different wireless modules. One smartphone equips
with the RFID reader Mod. A spectrum analyzer (Rohde & Schwarz model FSP13) is connected
to the RF shield box to monitor and record the RF signals in the box from frequency 13Mhz to
6Ghz. Another antenna is wired through the shield and is implanted into the enclosure to provide
cellular signal. The experiment testbed design is shown in Fig.5(b) and its setup illustrated in
Fig.5(b).
To perform the interference test on a wireless module or sensor, we take the following steps.
First, we place RFID tags into the RF shielded enclosure. Then, we engage the RF modules on
both smartphones and start transferring data from one smartphone to another or to the implanted
antenna. The data volume is 10G, hence its transmission provides us enough time to place both
phones into the RF shield box and complete the setup. In the third step, we engage the reader
Mod and keep it scanning the RFID tags. We then close the shield box and record the spectrums
with and without the reader Mod. Following sections illustrates the test results for each wireless
10. 136 Computer Science & Information Technology (CS & IT)
module/sensor, respectively. We label the start, peak and end of the spectrum with green dot and
specific frequency and decibel values.
(a) Tested design (b) Tested setup
Fig. 5. Testbed for Frequency Isolation Analysis
B. Radio Spectrum of RFID Scanning Signal
In Fig.6 we show our design that is active at frequency band ranging from 864 MHz to 944MHz
with energy peak at 912MHz. The strength at the peak is 15 dB at distance zero meters.
Fig. 6. UHF RFID Spectrum
1) Cellular Signal Interference: Testing for Cellular Interference is performed by connecting the
Moto-Z with our UHF RFID reader Mod, and a live Verizon SIM. In both cases, with or
without engaging the RFID reader, the radio spectrum of the Cellular voice call signal
remains the same, as illustrates in Fig.7(a), which indicates that there is no interference
between RFID reader signal and the Cellular signal. For the Cellular data streaming, there is
also no interference. The signal spectrum of data streaming with and without RFID reader
11. Computer Science & Information Technology (CS & IT) 137
scanning both follow the pattern depicted in Fig.7(b), all datasets streamed where received
without retransmission.
(a) Celluar Voice (b) Celluar LTE
Fig. 7. Frequency analysis I
2) Bluetooth Signal Interference: To test Bluetooth interference, we capture the signal spec-
trums of all four stage of BT communications, i.e., BT scanning, advertising, paring and data
transmission. The accumulated peak spectrums of all stages of BT communication, both with
and without RFID scanning activity, are followed the same pattern depicted in Fig.8(a). The
test results in Fig. 8 show no signal interference with Bluetooth, and we do not find
transmission errors with the dataset received on the PC side, which indicate there is no
interference between BT and RFID reader Mod.
3) Near Field Communication (NFC) Signal Interference : Testing for NFC interference is
performed by connecting the Moto Z with Mod, and using a NXP NFC tag. While reading the
tags memory, RFID background scanning is running. The test results in Fig.8(b) show no
signal interference with NFC, and neither errors when reading or writing to the NFC tag.
4) WiFi Signal Interference: For WiFi test, we measure the two modes of WiFi communication:
in 2.4G channel and in 5G channel. Both test are performed by set one smartphone as a
hotspot and use another one to connect to the hotspot. Experimental data shows that for both
modes, WiFi communication has no interference to the RFID reader Mod. The specific
spectrum data are illustrated in Fig.9(a) and Fig.9(b) for 2.4G mode and 5G mode,
respectively.
As illustrated in the five experiments above, our UHF RFID reader Mod has no interference on
mainstream smartphone connectivity systems, which means our design is able to coexist with the
native wireless sensors and communication modules.
12. 138 Computer Science & Information Technology (CS & IT)
(a) Bluetooth (b) NFC
Fig. 8. Frequency analysis II
(a) WiFi in (b) WiFi in 5GHz
Fig 9. 2.4GHz Frequency analysis III
C. Sensor Performance Evaluation
As a IoT sensor, the sensing range and the signal attenuation are two key parameters which
determine the quality of service of IoT sensing. In the following, we design two experiments to
evaluate these two features, respectively. For these two experiments, the environmental tem-
perature is 18.3 Celsius, the target RFID tag is SMARTRAC belt RFID paper tag [34] and the
experiment lab is covered with radio absorb material to eradicate the radio reflection from wall
faces. Battery is charged to 70%. Each value is the average value of 50 readings.
Our first experiment determines the sensing range of the UHF RFID reader Mod. From range 0
meter to 5 meters, we use our Mod to send 150 scanning signals at each distance and count the
13. Computer Science & Information Technology (CS & IT) 139
successful Electronic Product Code (EPC) reads from RFID tag. Fig.10(a) illustrates the
Successful EPC read count/rate of a RFID tag at different distances. As the picture shows, the
signal picking up ability reduces when the distance increases but still very reliable before 3.5
meters. From 3.5 meters to 4.5 meters, it degrades dramatically and tags with range longer than
4.5 meter cannot be recognized. We determine the sensing range as 4 meters where the expected
retry time is four, which is acceptable to most IoT sensing scenarios.
(a) EPC Read Evaluation Result (b) Attenuation Evaluation
Fig. 10. Evaluation Result
Our second experiment evaluates the signal sensitivity and attenuation of our reader Mod. In this
experiment, we measure the RSSI (Received Signal Strength Indicator) provide from the reader
IC from range 0 Meter to 4.2 Meter. The result is depicted in Fig.10(b) where the solid line is the
actual value and the dot line is the trendline. With the result from the previous experiment, the
attenuation distribution shows that the reader Mod has stable radio performance when signal
strength is higher than -65 dB (3.5 meters) and signals that are weaker than -70dB cannot be
detected. One interesting finding is that, in average, the attenuation increases with the grows of
the distance, but it also shows dramatic decrease in some distance pints. In our case, there are
three: 0.97 Meter, 3.18 Meter and 4.21 Meter. We are not able to explain this phenomenon for
now, but we will further study it in our future work.
5. CONCLUSION
In this paper, we design and implement a UHF RFID reader Mod with direct connection to a
mainstream smartphone, Moto-Z, without changing the hardware of the phone. The experimental
data proves that our design of the UHF RFID reader Mod can coexist with other smartphone
sensors and communication components with no conflict. Also, the battery life with active RFID
scanning is extended significantly due to the control system and the external power source design.
Our research and architecture has been tested for commercial deployment and we have high-
lighted the key hardware and software architecture components which are extensible and scalable
for continued research.
Through our work, mobile devices will take advantage of UHF RFID capabilities by evolving
into sensory data accumulators passing raw and fused sensor states to cloud infrastructure for
further compute-intensive processing. In our future work, we will optimize the algorithms
running on the sensor fusion core to further reduce the power consumption to the acceptable
range enabling us to remove the external power source. Next we will introduce RFID as a Sensor
(RaaS), providing even wider sensing spectrum and more comprehensive environmental
14. 140 Computer Science & Information Technology (CS & IT)
information. Coupled with a highly optimized Sensor Fusion Core (SFC) and Bluetooth Low
Energy (BLE) these sensors jointly provide a real-time, always-on and comprehensive sensory
system optimized for a mobile devices limited battery life. Optimized wireless monitoring
algorithms will be developed minimizing power consumption while guaranteeing an applications
Quality of Service (QoS) requirements. We will also further study the signal sensativitiy and
attenuation behaviors when the reader Mod is activated.
REFERENCES
[1] IDTechEx, R. Das, and P. Harrop, RFID forecasts, players and opportunities 2011-2021. IDTechEx,
2011.
[2] L. Yang, A. Rida, R. Vyas, and M. M. Tentzeris, “Rfid tag and rf structures on a paper substrate using
inkjet-printing technology,” IEEE Transactions on Microwave Theory and Techniques, vol. 55, no.
12, pp. 2894–2901, 2007.
[3] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer networks, vol. 54,
no. 15, pp. 2787–2805, 2010.
[4] B. Intelligenceo, “The global smartphone report: The forces behind the global deceleration in
smartphone sales,” http://www.businessinsider.com/, 2016.
[5] A. Kamilaris and A. Pitsillides, “Mobile phone computing and the internet of things: A survey,” IEEE
Internet of Things Journal, vol. 3, no. 6, pp. 885–898, 2016.
[6] S. Park, “A development of uhf rfid device for mobile iot service,” Ubiquitous Computing,
Electronics and Mobile Communication Conference (UEMCON), 2016.
[7] A. M. Requist and C. A. Requist, “Method for connecting a portable rfid reader to a handheld
computing device via an audio connection,” Mar. 14 2017, uS Patent 9,594,932.
[8] http://www.invengo.com/, “Invengo users manual,” 2014.
[9] http://chafon.com/, “Chafon users manual,” 2014.
[10] R. Triggs, “Lenovos sold 1 million moto z handsets globally,” http://www.androidauthority.com/1-
million-moto-z-sales-727170/, 2016.
[11] M. Mobility, https://developer.motorola.com/, 2016.
[12] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context aware computing for the
internet of things: A survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 414–
454, 2014.
[13] L. Capra, W. Emmerich, and C. Mascolo, “Carisma: Context-aware reflective middleware system for
mobile applications,” IEEE Transactions on software engineering, vol. 29, no. 10, pp. 929–945, 2003.
[14] T. Gu, H. K. Pung, and D. Q. Zhang, “A service-oriented middleware for building context-aware
services,” Journal of Network and computer applications, vol. 28, no. 1, pp. 1–18, 2005.
[15] A. Gluhak and W. Schott, “A wsn system architecture to capture context information for beyond 3g
communication systems,” in Intelligent Sensors, Sensor Networks and Information, 2007. ISSNIP
2007. 3rd International Conference on. IEEE, 2007, pp. 49–54.
15. Computer Science & Information Technology (CS & IT) 141
[16] A. Badii, M. Crouch, and C. Lallah, “A context-awareness framework for intelligent networked
embedded systems,” in Advances in Human-Oriented and Personalized Mechanisms, Technologies
and Services (CENTRIC), 2010 Third International Conference on. IEEE, 2010, pp. 105–110.
[17] X. Jia, Q. Feng, T. Fan, and Q. Lei, “Rfid technology and its applications in internet of things (iot),”
in Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International
Conference on. IEEE, 2012, pp. 1282–1285.
[18] M. S. Khan, M. S. Islam, and H. Deng, “Design of a reconfigurable rfid sensing tag as a generic
sensing platform toward the future internet of things,” IEEE Internet of things journal, vol. 1, no. 4,
pp. 300–310, 2014.
[19] E. Welbourne, L. Battle, G. Cole, K. Gould, K. Rector, S. Raymer, M. Balazinska, and G. Borriello,
“Building the internet of things using rfid: the rfid ecosystem experience,” IEEE Internet computing,
vol. 13, no. 3, 2009.
[20] M. Liukkonen and T.-N. Tsai, “Toward decentralized intelligence in manufacturing: recent trends in
automatic identification of things,” The International Journal of Advanced Manufacturing
Technology, vol. 87, no. 9-12, pp. 2509–2531, 2016.
[21] K. Ding, P. Jiang, P. Sun, and C. Wang, “Rfid-enabled physical object tracking in process flow based
on an enhanced graphical deduction modeling method,” IEEE Transactions on Systems, Man, and
Cybernetics: Systems, 2017.
[22] F. Bibi, C. Guillaume, N. Gontard, and B. Sorli, “A review: Rfid technology having sensing aptitudes
for food industry and their contribution to tracking and monitoring of food products,” Trends in Food
Science & Technology, 2017.
[23] M. M. LLC, “Bring your moto mod from concept to market,” in
https://enterprise.indiegogo.com/motomods. Motorola Mobility, 2016.
[24] M. Mobility, “Mdk user guide: Hat adapter board,” https://developer.motorola.com/build/mdk-user-
guide/hat-adapter-board, 2016.
[25] A. ray, “Greybus protocol an application layer for unipro,” Project Ara Developers Conference,
http://www.modularphonesforum.com/news/greybus-protocol-an-application-layer-for-unipro-491/,
2015.
[26] M. Mobility, “Moto mods system architecture,” https://developer.motorola.com/explore/system-
architecture, 2016.
[27] G. Nutt, “Nuttx operating system user s manual,” 2014.
[28] D. Lautner, X. Hua, S. Debates, M. Song, J. Shah, and S. Ren, “Baas (bluetooth-as-a-sensor):
conception, design and implementation on mobile platforms,” in Proceedings of the Symposium on
Applied Computing. ACM, 2017, pp. 550– 556.
[29] D. Lautner, S. DeBates, J. Shah, M. Song, and S. Ren, “Sensor-based low power management for
mobile platforms,” in High Performance Computing and Communications (HPCC), 2015 IEEE 7th
International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International
Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on.
IEEE, 2015, pp. 934–940.
16. 142 Computer Science & Information Technology (CS & IT)
[30] J. C. Rautio, “Measurement of uniaxial anisotropy in rogers ro3010 substrate material,” in
Microwaves, Communications, Antennas and Electronics Systems, 2009. COMCAS 2009. IEEE
International Conference on. IEEE, 2009, pp. 1–4.
[31] Q. Yu, “Radiated spurious emissions measurement by substitution method,” in Electromagnetic
Compatibility (EMC), 2010 IEEE International Symposium on. IEEE, 2010, pp. 159–164.
[32] C. H. Z. X. S. Linfang, “Inter-modulation distortion analysis for single-drive mach-zehnder modulator
[j],” Acta Optica Sinica, vol. 11, p. 004, 2006.
[33] J. McRory and R. Johnston, “An rf amplifier for low inter-modulation distortion,” in Microwave
Symposium Digest, 1994., IEEE MTT-S International. IEEE, 1994, pp. 1741–1744.
[34] K. Ding, P. Jiang, P. Sun, and C. Wang, “Smartrac belt rfid paper tag,” https://www.smartrac-
group.com/belt.html, 2017.