It is very important to identify each belongings to its owner to prevent these things get lost. A traditional way is to label or paste barcodes to every objects. Currently, there are emerging technologies that allow us to label everything, person or place. This paper presents a solution based on RFID technology (Radio Frequency Identification) for identifying objects in a temporary shelter. To do this, a computer application is used to control the incoming and outgoing of the personal belongings of victims rescued from a natural disaster, this application is used in temporary shelters. Our solution allows communication between a reader and RFID tags, just as the application accesses a database to store the information needed to control personal belongings of affected people. The application attempts to reduce risks of loss of belongings and information, allowing the identification of each object when located within the radius of coverage of the reader, showing the information associated with the items (objects) and owner
IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals. Dr. E. J. Thomson Fedrik | A. Vinitha | B. Vanitha ""Review on Vulnerabilities of IoT Security"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24020.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/24020/review-on-vulnerabilities-of-iot-security/dr-e-j-thomson-fedrik
A research survey rfid security & privacy issuecsandit
“Information security and privacy” is one of the major challenges in the communication world
of IT as each and every information we pass need to be secured enough to the extent that it
doesn’t hurt anyone’s privacy. In trace and track world RFID play a pivotal role. We cannot
track people as it causes a privacy risk. Migration of data to cloud also comes under threat as
many things cannot be control over there. A trusted database is needed which can maintain and
enforce the privacy policy. In order to cater all these requirements, a secure, cheap and
complex computation encryption-decryption algorithm is required to meet this challenge.
This paper is based on the research survey of previous and current security and privacy
techniques used for securing RFID tag and reader communication and their impact on real
world.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
Sbvlc secure barcode based visible light communication for smartphones
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
Today piracy is one of the most important issues that the owners of multimedia contents are facing now. So
it becomes necessary to protect the copyright of digital media. The new technology proposed to solve the “problem”
of enforcing the copyright of content transmitted across shared networks is Invisible Digital Watermark. It is a
technique of steganography that allow a copyright holder to insert a hidden message (invisible watermark) within
images, sound files, moving pictures and even raw text. To watermark a video it is divided into frames then extract
each bit of a frame and modify it with reference to original RGB value to embed a watermark in it. The location of
the embedded text is maintained as a key file and the frames are integrated as a video again. The slight changes in
RGB value scattered across the frame makes it impossible to visibly detect the difference when compared to original
video. To detect the piracy of video using the key file the copyright information is extracted from the watermarked
data. From the copyright information it is possible to find the source of piracy and thus necessary action can be
taken.
Keywords — hacking, authentication, cryptography, steganography, copyright.
IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals. Dr. E. J. Thomson Fedrik | A. Vinitha | B. Vanitha ""Review on Vulnerabilities of IoT Security"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24020.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/24020/review-on-vulnerabilities-of-iot-security/dr-e-j-thomson-fedrik
A research survey rfid security & privacy issuecsandit
“Information security and privacy” is one of the major challenges in the communication world
of IT as each and every information we pass need to be secured enough to the extent that it
doesn’t hurt anyone’s privacy. In trace and track world RFID play a pivotal role. We cannot
track people as it causes a privacy risk. Migration of data to cloud also comes under threat as
many things cannot be control over there. A trusted database is needed which can maintain and
enforce the privacy policy. In order to cater all these requirements, a secure, cheap and
complex computation encryption-decryption algorithm is required to meet this challenge.
This paper is based on the research survey of previous and current security and privacy
techniques used for securing RFID tag and reader communication and their impact on real
world.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
Sbvlc secure barcode based visible light communication for smartphones
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
Today piracy is one of the most important issues that the owners of multimedia contents are facing now. So
it becomes necessary to protect the copyright of digital media. The new technology proposed to solve the “problem”
of enforcing the copyright of content transmitted across shared networks is Invisible Digital Watermark. It is a
technique of steganography that allow a copyright holder to insert a hidden message (invisible watermark) within
images, sound files, moving pictures and even raw text. To watermark a video it is divided into frames then extract
each bit of a frame and modify it with reference to original RGB value to embed a watermark in it. The location of
the embedded text is maintained as a key file and the frames are integrated as a video again. The slight changes in
RGB value scattered across the frame makes it impossible to visibly detect the difference when compared to original
video. To detect the piracy of video using the key file the copyright information is extracted from the watermarked
data. From the copyright information it is possible to find the source of piracy and thus necessary action can be
taken.
Keywords — hacking, authentication, cryptography, steganography, copyright.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
In the past decade, internet of things IoT has been a focus of research. It makes more intelligent to core element of modern world such as hospitals, cities, organizations, and buildings. Usually, IoT has four major components including sensing, information processing, applications and services, heterogeneous access and additional components e.g. Security and privacy. In this paper, we are presenting security perspective from the perspective of layers that comprises IoT. In this we focus on the overview of IoT security perspective. Sunilkumar Malge | Pallavi Singh ""Internet of Things (IoT): Security Perspective"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24010.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/24010/internet-of-things-iot-security-perspective/sunilkumar-malge
The key challenge for librarians today is to improve customer services and provide
Patrons with a pleasant experience when searching and browsing books. RFID
Technology significantly reduces management costs and increases the time that
Librarians spend with patrons by enabling automated book handling at check-ins,
Check-outs, collections inventories, book sorting and theft deterrence. RFID plays vital
Role in redefining the library process to make everyone’s job easier right from patron
To library staff
The Revolutionary Solution in Secured Digital IdentificationINPI ASIA Admin
NDCode is a new generation of physical feature securing the physical-to-digital link using Nanotechnology and Blockchain that creates one of the product solution named DOCKrypto, the Digital Link for Security Paper.
NDCodeTM binds with the physical object and is non-separable especially in the primary use cases such as document security. NDCodeTM carries seed information which when combined with hardware reader secret, forms a deterministic key-pair.
This enables both the identification of original items (strong physical anticounterfeit) and strong proof through cryptography that data digitally signed by the object is authentic. For example • The “proof-of-scan” provides strong audit evidence that the real original object was scanned at a location. This enables authenticated traceability where only the real object with specific NDCodeTM can provide the track-and-trace server with a valid digital signature. • In document security, when authorities issue an original document the content is digitally signed by NDCodeTM, any subsequent altering of the data can be easily identified by use of digital signatures.
Combining Technologies
High security does come with some compromise in terms of utility. For example, NDCodeTM cannot be directly read with a smartphone and requires use of proprietary reader technology. To open the use of NDCodeTM to the public user, INPI ASIA is releasing DOCKryptoTM: a document security solution, the first product using NDCodeTM. DOCKryptoTM combines NDCodeTM, with standard QR-Codes and public blockchain technology, so that authorities can control the issuance of documents, but the public can access the data via smartphone app by scanning a QR-Code printed on the document.
DOCKrypto TM : The digital link for security paper
The advances in digital technologies and availability of equipment at low-cost has made the counterfeit of paper-based value documents relatively easy. Analog-type security features are failing to meet the demands of digital business processes.
DOCKryptoTM is the digital link to bring paper-based value documents to the digital age. The solution addresses trust and transparency for document security. Value emerging from the solution are
• Digital transformation where any paper document becomes a digital ePaper.
• Preventing any ability of physical certificate cloning or counterfeiting.
• End-to-end security where the blank paper is traced prior to any personalisation from the secure printery to the registry authority.
• Enabling issuing of certified digital copies that are assigned to owners and cryptographically linked to the original physical copy.
• Enabling digital notarization whilst maintaining traditional notarization.
• Building trust / transparency and closing issuances loops with blockchain technology.
Try it now – Download KryptoMobileTM from the Play Store
Get the App on google play https://play.google.com/store/apps/details?id=krypto.mobile
RFID has become an integral part of Modern Day Libraries of Institutes.
From Book Issue- return to inventory taking and book security, RFID plays a vital role in day to day work of library staff and students.
The presentation describes how RFID can be implemented in library, features, benefits and components.
ETS RFID one of the leading solution provider for RFID Library Automation in India.
It is important to understand that there are products on the market that use a digital signature or digital certificate, or both. In either case the security is provided by a digital password.
We are different.
We offer the product that combines unique characteristics of the individual to Certificates Public or Private, ensuring their safety in a unique way. With asymmetric key itself, our software is ready to use any biometric product on the market, adapting to the needs of each client.
Digital Watermarking describes methods and technologies that hide information, for example a number or text, in digital media, such as images, video. The embedding takes place by manipulating the content of the digital data, which means the information is not embedded in the frame around the data. The hiding process has to be such that the modifications of the media are imperceptible. For images this means that the modifications of the pixel values have to be invisible.
A digital watermark is a message which is embedded into digital content (video, images or text) that can be detected or extracted later. Moreover, in image the actual bits representing the watermark must be scattered throughout the file in such a way that they cannot be identified and manipulated. Watermarking is the insertion of imperceptible and inseparable information into the host data for data security & integrity. They are characterizing patterns, of varying visibility, added to the presentation media as a guarantee of authenticity, quality, ownership, and source. However, in digital watermarking, the message is supposed not to visible (or at least not interfering with the user experience of the content), but (only) electronic devices can retrieve the embedded message to identify the code. Another form of digital watermarking is known as steganography, in which a message is hidden in the content without typical citizens or the public authorities noticing its presence. Only a limited number of recipients can retrieve and decode the hidden message. Unlike a traditional watermark on paper, which is generally visible to the eye, digital watermarks can be made invisible or inaudible. They can, however, be read by a computer with the proper decoding software.
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...IJECEIAES
The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between userexperience and security demands exists. The Near Field Communication or NFC is one such communication trend which is effectively adopted by the user worldwide to make touchless operation using their mobile device. Although, it is claimed that NFC incorporates some of the standard encryption but existing researchers fails to prove that their electromagnetic signals are snot so difficult to compromise to result in collateral damage to user's resources. Thus, there exist research work towards strengthing security system, but there is yet to report on any standard security protocol or framework to ensure the highest resiliency. This paper provides a comprehensive visualization towards the effectiveness of existing research approaches to formulate the research trend and gap.
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
The frequent availability of digital data such as audio, images and videos became possible to the public through the expansion
of the internet. Digital watermarking technology is being adopted to ensure and facilitate data authentication, security and copyright
protection of digital media. It is considered as the most important technology in today’s world, to prevent illegal copying of data. Digital
watermarking can be applied to audio, video, text or images. This paper includes the detail study of watermarking definition and various
watermarking applications and techniques used to enhance data security.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
In the past decade, internet of things IoT has been a focus of research. It makes more intelligent to core element of modern world such as hospitals, cities, organizations, and buildings. Usually, IoT has four major components including sensing, information processing, applications and services, heterogeneous access and additional components e.g. Security and privacy. In this paper, we are presenting security perspective from the perspective of layers that comprises IoT. In this we focus on the overview of IoT security perspective. Sunilkumar Malge | Pallavi Singh ""Internet of Things (IoT): Security Perspective"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24010.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/24010/internet-of-things-iot-security-perspective/sunilkumar-malge
The key challenge for librarians today is to improve customer services and provide
Patrons with a pleasant experience when searching and browsing books. RFID
Technology significantly reduces management costs and increases the time that
Librarians spend with patrons by enabling automated book handling at check-ins,
Check-outs, collections inventories, book sorting and theft deterrence. RFID plays vital
Role in redefining the library process to make everyone’s job easier right from patron
To library staff
The Revolutionary Solution in Secured Digital IdentificationINPI ASIA Admin
NDCode is a new generation of physical feature securing the physical-to-digital link using Nanotechnology and Blockchain that creates one of the product solution named DOCKrypto, the Digital Link for Security Paper.
NDCodeTM binds with the physical object and is non-separable especially in the primary use cases such as document security. NDCodeTM carries seed information which when combined with hardware reader secret, forms a deterministic key-pair.
This enables both the identification of original items (strong physical anticounterfeit) and strong proof through cryptography that data digitally signed by the object is authentic. For example • The “proof-of-scan” provides strong audit evidence that the real original object was scanned at a location. This enables authenticated traceability where only the real object with specific NDCodeTM can provide the track-and-trace server with a valid digital signature. • In document security, when authorities issue an original document the content is digitally signed by NDCodeTM, any subsequent altering of the data can be easily identified by use of digital signatures.
Combining Technologies
High security does come with some compromise in terms of utility. For example, NDCodeTM cannot be directly read with a smartphone and requires use of proprietary reader technology. To open the use of NDCodeTM to the public user, INPI ASIA is releasing DOCKryptoTM: a document security solution, the first product using NDCodeTM. DOCKryptoTM combines NDCodeTM, with standard QR-Codes and public blockchain technology, so that authorities can control the issuance of documents, but the public can access the data via smartphone app by scanning a QR-Code printed on the document.
DOCKrypto TM : The digital link for security paper
The advances in digital technologies and availability of equipment at low-cost has made the counterfeit of paper-based value documents relatively easy. Analog-type security features are failing to meet the demands of digital business processes.
DOCKryptoTM is the digital link to bring paper-based value documents to the digital age. The solution addresses trust and transparency for document security. Value emerging from the solution are
• Digital transformation where any paper document becomes a digital ePaper.
• Preventing any ability of physical certificate cloning or counterfeiting.
• End-to-end security where the blank paper is traced prior to any personalisation from the secure printery to the registry authority.
• Enabling issuing of certified digital copies that are assigned to owners and cryptographically linked to the original physical copy.
• Enabling digital notarization whilst maintaining traditional notarization.
• Building trust / transparency and closing issuances loops with blockchain technology.
Try it now – Download KryptoMobileTM from the Play Store
Get the App on google play https://play.google.com/store/apps/details?id=krypto.mobile
RFID has become an integral part of Modern Day Libraries of Institutes.
From Book Issue- return to inventory taking and book security, RFID plays a vital role in day to day work of library staff and students.
The presentation describes how RFID can be implemented in library, features, benefits and components.
ETS RFID one of the leading solution provider for RFID Library Automation in India.
It is important to understand that there are products on the market that use a digital signature or digital certificate, or both. In either case the security is provided by a digital password.
We are different.
We offer the product that combines unique characteristics of the individual to Certificates Public or Private, ensuring their safety in a unique way. With asymmetric key itself, our software is ready to use any biometric product on the market, adapting to the needs of each client.
Digital Watermarking describes methods and technologies that hide information, for example a number or text, in digital media, such as images, video. The embedding takes place by manipulating the content of the digital data, which means the information is not embedded in the frame around the data. The hiding process has to be such that the modifications of the media are imperceptible. For images this means that the modifications of the pixel values have to be invisible.
A digital watermark is a message which is embedded into digital content (video, images or text) that can be detected or extracted later. Moreover, in image the actual bits representing the watermark must be scattered throughout the file in such a way that they cannot be identified and manipulated. Watermarking is the insertion of imperceptible and inseparable information into the host data for data security & integrity. They are characterizing patterns, of varying visibility, added to the presentation media as a guarantee of authenticity, quality, ownership, and source. However, in digital watermarking, the message is supposed not to visible (or at least not interfering with the user experience of the content), but (only) electronic devices can retrieve the embedded message to identify the code. Another form of digital watermarking is known as steganography, in which a message is hidden in the content without typical citizens or the public authorities noticing its presence. Only a limited number of recipients can retrieve and decode the hidden message. Unlike a traditional watermark on paper, which is generally visible to the eye, digital watermarks can be made invisible or inaudible. They can, however, be read by a computer with the proper decoding software.
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...IJECEIAES
The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between userexperience and security demands exists. The Near Field Communication or NFC is one such communication trend which is effectively adopted by the user worldwide to make touchless operation using their mobile device. Although, it is claimed that NFC incorporates some of the standard encryption but existing researchers fails to prove that their electromagnetic signals are snot so difficult to compromise to result in collateral damage to user's resources. Thus, there exist research work towards strengthing security system, but there is yet to report on any standard security protocol or framework to ensure the highest resiliency. This paper provides a comprehensive visualization towards the effectiveness of existing research approaches to formulate the research trend and gap.
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
The frequent availability of digital data such as audio, images and videos became possible to the public through the expansion
of the internet. Digital watermarking technology is being adopted to ensure and facilitate data authentication, security and copyright
protection of digital media. It is considered as the most important technology in today’s world, to prevent illegal copying of data. Digital
watermarking can be applied to audio, video, text or images. This paper includes the detail study of watermarking definition and various
watermarking applications and techniques used to enhance data security.
Conjunto de medidas aprobadas por el Consejo de Ministros para fomentar el crecimiento, la competitividad y la eficiencia de la economía española. Junio 2014.
Apresentação que costumo utilizar na época da Estação Seca. Foi modificada durante um curso que fiz que ensina, dentre outras coisas, a aprimorar material didático.
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
Complex Event Processing Using IOT Devices Based on Arduinoneirew J
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
The Internet of Things (IoT) enables numerous business opportunities in fields as diverse as e-health, smart
cities, smart homes, among many others. The IoT incorporates multiple long-range, short-range, and
personal area wireless networks and technologies into the designs of IoT applications. Localisation in
indoor positioning systems plays an important role in the IoT. Location Based IoT applications range from
tracking objects and people in real-time, assets management, agriculture, assisted monitoring technologies
for healthcare, and smart homes, to name a few. Radio Frequency based systems for indoor positioning
such as Radio Frequency Identification (RFID) is a key enabler technology for the IoT due to its costeffective,
high readability rates, automatic identification and, importantly, its energy efficiency
characteristic. This paper reviews the state-of-the-art RFID technologies in IoT Smart Homes applications.
It presents several comparable studies of RFID based projects in smart homes and discusses the
applications, techniques, algorithms, and challenges of adopting RFID technologies in IoT smart home
systems.
Smart Home Security and Intrusion Detection Systemijtsrd
Conventional security systems which are the very common form of protection to lives and properties, have certain limitations such as real time monitoring and control of activities such as intruders in the form of human beings, fire, smoke, et cetera. These limitations in most cases result in high financial loss to properties and lives. This work involves the design and construction of GSM intelligent home security system for real time monitoring of different forms of intrusion. It consist of intrusion detection sensors, pressure, Smoke Fire, Gas and PIR motion , wireless sensors, programmable microcontroller in embedded C language, regulated power supply unit, proteus circuit simulator , relays, GSM modem, mobile phone, data acquisition node and an interface program development. The design calculation and analysis was carried out before it was modelled, simulated in proteus electronic simulator environment. When the PIR finds intruders in form of variation in temperature, gas leakage, pressure , the relevant sensing device s respond and the microcontroller sends encoded alarm signal to the wireless sensor network established in home. The moment the alarm signal is received, it will send alarm short message to the users owners of the building through GSM network immediately. The design analysis and calculations were carried out and finally, a positive result was achieved. Usiade, Rex Ehiedum | Adeoye, Olayode Semiu "Smart Home Security and Intrusion Detection System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52543.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/52543/smart-home-security-and-intrusion-detection-system/usiade-rex-ehiedum
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
Internet of Things IoT Based Smart Environment Integrating Various Business A...ijtsrd
In this paper, we emphasize the concept of Internet of Things IoT , in addition to reviewing the main challenges of the IoT environment by focusing on the recent research directions in this topic. With the increasing dependency of events over the smart objects which can be easily controlled and monitored, can be identified automatically and communicate with each other through internet and can make decisions by themselves, there is an urgent need of new paradigm which can connect these smart devices together and that new paradigm is Internet of Things. in fact, the IoT environment possesses a large range of challenges has a wide impact on their performance, which can be divided into two categories, that is i General challenges for example communication, heterogeneity, virtualization and security plus ii Unique challenges for example wireless sensor network WSN , Radio Frequency Identification RFID , and as a final point Quality of service QoS which is measured as a common factor between general and special challenges. This paper highlights the major applications of the IoT. More than a small number of sectors like security and emergency, meteorology, banking, agriculture, Surveillances, health care, education, government e services, domestic appliances monitoring, traffic surveillance are integrated and a variety of objects and devices are connected using RFID technology. This paper as well describes that how various fields are connected by means of RFID technology and sensor networks. Dr. Vijeta Kumawat | B. Umamaheswari ""Internet of Things (IoT) Based Smart Environment Integrating Various Business Applications and Recent Research Directions"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23658.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/23658/internet-of-things-iot-based-smart-environment-integrating-various-business-applications-and-recent-research-directions/dr-vijeta-kumawat
Iot: Introduction ,architecture ,application especially engineering ,software,hardware,protocols and challenges
nodered software code for Iot simulation
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
Internet of Things: Definition, Applications, Issues and Future Prospectiverahulmonikasharma
Internet of Things (IoT) is the extension of Internet into the physical environment around us; by the embodiment of electronics into the everyday physical objects that we tend to use. This makes the digital and physical entities linked by the means of appropriate communication technologies. Penetration of these everyday objects into the web strengthens the goal of offering a whole new set of services to the users, showing them the amalgamation of varied devices, versatile data and various technologies as one common operating picture, using IoT. With the IoT advancements in various sectors, more number of devices are being digitally augmented leading to the discovery of newer issues and challenges that are faced due to these 3 Vs; varied devices, versatile data and various technologies. This survey focuses on identification of such issues and challenges in IoT; suggesting some clues for future research.
An enormous number of understudies are leaving from home to class and school to home each day. For folks, basic issue is getting a sheltered transport for their youngsters. Numerous youngsters get themselves secured a school transport, nodding off or leave at the wrong station with no strategy to track them. This examination tried the materialness of radio recurrence ID (RFID) innovation with GSM in following and checking youngsters amid their excursion to and from school on school transports. The aloof RFID following innovation is utilized for kid security framework because of its following capacities, ease. Be that as it may, the disadvantage of this current framework is negligence. The proposed frameworks give FACE RECOGNITION SYSTEM GSM. Face acknowledgment is a proficient technique to recognize a face in a picture and it is anything but difficult to keep up.
Similar to RFID Smart Tags for Controlling Belonging in Shelters (20)
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Gen AI Study Jams _ For the GDSC Leads in India.pdf
RFID Smart Tags for Controlling Belonging in Shelters
1. Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56
www.ijera.com 51|P a g e
RFID Smart Tags for Controlling Belonging in Shelters
Miguel A. Wister*, Pablo Pancardo Garcia*, Jose A. Hernandez-Nolasco*,
Francisco Diego Acosta Escalante* and Pablo Payro Campos*
*(Academic Division of Information Technology and Systems, Juarez Autonomous University of Tabasco.
Cunduacan, Tabasco, Mexico.)
ABSTRACT
It is very important to identify each belongings to its owner to prevent these things get lost. A traditional way is
to label or paste barcodes to every objects. Currently, there are emerging technologies that allow us to label
everything, person or place. This paper presents a solution based on RFID technology (Radio Frequency
Identification) for identifying objects in a temporary shelter. To do this, a computer application is used to
control the incoming and outgoing of the personal belongings of victims rescued from a natural disaster, this
application is used in temporary shelters. Our solution allows communication between a reader and RFID tags,
just as the application accesses a database to store the information needed to control personal belongings of
affected people. The application attempts to reduce risks of loss of belongings and information, allowing the
identification of each object when located within the radius of coverage of the reader, showing the information
associated with the items (objects) and owner.
Keywords:RFID tag, IoT, Mobile Applications.
I. INTRODUCTION
Connect all things to the Internet is a
recent trend that has been called Internet of Things
(IoT), the concept of IoT is a new topic in the field
of wireless technology. In IoT everything is
connected. IoT describes the ubiquitous presence of
a variety of devices such as sensors, actuators, and
smartphones or mobile phones through unique
addressing schemes, allowing all these items to
interact and cooperate with each other to achieve
common objectives [1].
In [2] it is mentioned that Internet of
Things as a paradigm result of the convergence of
three different visions: Internet-oriented vision
(middleware), oriented things vision (sensors) and
oriented semantics vision (knowledge). In various
previous works dealing with these terms [3] [4].
To achieve a complete vision of IoT and
storage resources is essential to cloud computing.
Cloud computing is the latest model to emerge that
promises reliable services delivered through data
centers next-generation technologies that are based
on virtualized storage. Cloud acts as a data receiver
of the ubiquitous computing sensors; as a computer
to analyze and interpret data; and provide the user
easily to understand display based on the Web [5].
Therefore, it is possible to use the concept
of IoT to provide communication capabilities for a
device that could promptly alert a population
before a natural disaster.
Before using sensors built into the IoT
("Things" -oriented view) some works have been
proposed for disaster [6] [7] [8] [9]. Specifically
"things" vision-oriented functions as [10] [11]
where RFID technology is used. However, we are
particularly interested in applications that focus on
flood disasters. For example, the ALERT system to
advice for flood [12]. This system uses remote
sensing to transmit environmental data to a
computer system. Some sensors installed in the
warning system are used to detect rain, water level,
and meteorological data. These sensors provide
information to the system into a centralized
database. Another example is found in [13], here
there is a detection system using a landslide WSN
(Wireless Sensor Network). This mentioned system
is more convenient since it provides an early
warning and allows learning about the phenomena
of natural disasters.
Currently, systems, emergency
management, and disaster recovery include several
parts such as a communication infrastructure and a
system of information management [14].
II. BACKGROUND
As we mentioned above, we are interested
in flooding scenarios. Tabasco state represents a
high-risk scenario because the flooding by rains
that have occurred in recent years, these torrential
rains have caused extensive damage to
infrastructure, materials, and human losses.
During a flood caused by overflowing
rivers due to torrential rains, a high percentage of
homes are damaged, and therefore the habitats and
owners of these homes take refuge in temporary
shelters for protection, treatment and to be provided
with food, medicines and a place to stay.
RESEARCH ARTICLE OPEN ACCESS
2. Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56
www.ijera.com 52|P a g e
These natural disasters are common events
in the history of Tabasco, therefore, shelters for the
people that leave their homes because of these
phenomena are frequently. There are families who
arrive at these shelters with few personal
belongings that they could save from their homes,
which should be managed and stored properly.
In such disasters, people are afraid of
losing their belongings that still remain, since
facilities in shelters do not have an efficient control
of goods. While some few shelters the control is
carried out on printed formats, most of the shelters
in Tabasco do not have a control system that
identifies the victims’ personal belongings, hence, a
solution that solves this problem is necessary.
Traditionally, things (objects) are
inventoried in many ways, one of which has been
just to fill printed formats, otherwise is the use of a
marker to write a code on these objects to identify
them. From these codes is created a list, in the best
case, is registered into a table or worksheet file.
One more modern technique is to paste a barcode
sticker to each object in order to save the identity
and belongings. Although the techniques
mentioned above are very commonly used, they are
not completely reliable and secure to identify and
control belongings. Consequently, it is proposed to
use RFID smart tag technology.
Technology Radio Frequency
Identification RFID (Radio Frequency
IDentification) is undoubtedly one of the
technologies that have experienced faster growth
and sustained in recent times.
The current existence of viable RFID-
based applications is due to the development of
three main technological areas: a) Radio Frequency
Electronics, it is necessary for the development of
antennas and radio frequency systems present in
the RFID tags; b) Information technology, in
computing and communications it is necessary to
associate the reader with the smart tag through an
information system; and c) materials technology, it
is necessary for to reduce cost of the smart tags.
The possibilities offered by remote
reading of the information contained on a tag,
without physical contact, along with the ability to
perform multiple readings simultaneously, open the
door to a very large set of applications in a variety
of fields, from inventory control, location of people
and property, security or access control [15].
Barcodes, smart tags, and other
technologies withstand extreme temperatures,
humidity, acids, solvents, paint, grease, among
other damaging agents and also provide a unique
code, cannot be repeated, they are ergonomic, its
use is more flexible because they prevent straying.
III. ARCHITECTURAL DESIGN
To implement the solution we used the
methodology based on RUP model because it
tracks the best features of the software processes so
that implement many of the best principles of agile
development, so we can evaluate all phases that
compose it.
Development software and language,
reader/writer RFID and RFID tags
To develop and operate the prototype, we
used a PC based on Windows 7 (64-bit) and
corresponding drivers needed to operate the
reader/writer RFID (D2XX and VCP), which were
installed to generate a COM port to connect the
RFID reader/writer and the PC. The programming
language used to develop the prototype was C#, the
IDE was Microsoft Visual Studio. The database
management system was MySQL.
We used a multi ISO RFID reader (OK
5553) to read/write on tags (see Fig. 1). This reader
contains a module for integration with RS-232
connectivity, compatible with ISO standards
14443, ISO 14443B, ISO 15693, ISO 18000-3,
EPC RFID devices, Mifare, NFC and ICODE. This
RFID reader can read Multi ISO tags, that can
communicate with Philips MIFARE family and
labels with standard ISO 15693, ISO 14443,
ISO14443, ISO 18000-3, EPC and UID tags.
Fig 1. Multi ISO Reader (OK 5553) RFID for
reading and writing on cards and tags.
The application allows writing and reading
on two types of RFID tags: Tag Mifare (ISO
14443) and RFID (ISO 15693 card (see Fig 2).
3. Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56
www.ijera.com 53|P a g e
Fig 2.Mifare (ISO 14443) and RFID (ISO 15693)
tags for recording personal data of owners (guest).
IV. DEVELOPING
In an object control application, the
priority is to achieve a risk reduction so that
personal items are safe and no wanderings of those
objects. Write over an object code or registration
for inventory it is not safe, because after writing it,
we have to score the same code in a notebook or an
electronic format, running the risk that may be
confused with a letter or number, which it would
affect the identification of the owner and similarly
the registration or code is written with down, which
runs the risk of wearing out and is erased or
illegible, plus it would still be an antiquated and
tedious process.
The proposal of this work is to develop an
application that interacts with a reader / writer
RFID and can display data read from a tag attached
to the object. This data can be stored in a database
that records information on the contents of the
object, amount, location, owner, etc. Identity
information obtained with the reader / writer
corresponds to that found in the database and
displayed to the user with everything that contains
the record.
It is considered that the system is able to
provide risk reduction control to be able to show at
any time the user information stored in the database
system.
The main objective of the solution is to
design a computer system based on RFID
technology that takes control of the guest’s
personal belongings hosted in a temporary shelter.
In addition to building software to read data from a
RFID tag located on an object and personal
identification of the owner, it is necessary to have a
database that stores the information read from
RFID tags and it is constantly up to date. And
validate that the information stored in the database
is complete and correct.
With RFID technology, personnel
responsible for inspection of objects in shelters,
they manage to know precisely and in real time
how many and what type of objects are in the
warehouses of shelters and even the data owner
listed, improving thus integrated warehouse
management of shelters. Similarly, if the RFID
application is combined with other technologies
such as tracking systems, video cameras and other
surveillance related elements, it becomes a more
useful tool to prevent theft in stores shelters.
While designing the application is
submitted inventory control object, it should be
noted that all activities commonly inventory control
handles are not used.
Analysis and design
Turning to more specific aspects of
design, project development model used is
prototyping, since the intention was to create a first
model that serves to build similar. The prototype
was the result of the analysis and design of a
proposal to control objects in a typical shelter.
The prototype was built in a short time
using the appropriate programs and without using
many resources. We used object-oriented
programming (OOP) in C# language. C# uses OOP
and works with .NET environment.
Regarding to the database design, in
Figure 3 is shown the structure of the RFID
database, relations with their respective prototype
and fields of the RFID database. The database
design fulfills the standards of the relational model
required for optimum performance. The application
uses four tables: propietario (owner), usuarios
(users), almacen (stock), and articulos (items).
Fig 3. Tables: propietario, almacen, usuarios,
articulos (owner, stock, users, items).
V. EXPERIMENTAL RESULTS
In order to check reading and writing
operations on a tag, we made tests with the
reader/writer (Multi ISO RFID). All tests (ID
detection, data reading, and data writing
operations) have been completed and all data have
been checked to validate the appropriate
processing.
Initially, data of refugees are stored in the
database. CURP (ID) is the identifier or primary
key for each user, this value is the unique field that
is stored on the bracelet, other data users are stored
in the database that resides on the hard disk.
4. Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56
www.ijera.com 54|P a g e
Implementation
To carry out the tests of the application,
we printed commons items (radios, TV, watches,
home appliances, among others) to simulate
belongings of the victims in shelters. Those images
were printed on acetate sheets and RFID sticker
was pasted on each acetate sheet in order to
simulate the labeling associated to the belongings,
an example can be seen in Figure 4.
Subsequently, many items marked were
recorded with a RFID tag and stored in the
database with its unique identification, description
and the relevant association to an owner, so an
article can only belong to one owner, however, an
owner may have associated multiple items.
Fig 4.Smart tags to identify or label belongings
(objects).
Figures 5 and 6 are shown four ID cards
labeled with photographs and personal data of the
victims (owners of the items). Here are presented
such identifications that serve as examples of cards
that users show as owners items that they bring and
will be registered when entering into the shelter;
these cards must be the "ID" from the same person,
in this case may be the CURP. In addition to
containing physical identification within the RFID
chip, on the back side of the label owner also
brings labeled a barcode and QR code that points to
a link to expand the information about the person.
Fig 5. ID cards owners of objects or assets (front).
Each card has an RFID card.
Fig 6.Owner’s ID cards (rear).
The final product is shown below and
describes the initial interface of the developed
system.
Fig 7. Interface to the application.
In Fig. 7 the first interface that appears to
start the prototype shown. This screen is to
authenticate, must fill the fields username and
password to start the application.
Fig 8. Interface in the application for registration of
owners.
In Fig 8 is shown an example in order to
store personal data of an owner of items in the
database. We tap the card on the tag reader, to fill
the data stored into the database and select the
button "to generate id" followed by "save" option,
so the ID card owner and their data are stored.
We write all RFID cards to each owner of
belongings and each RFID tag to the items that the
guests brought when arriving at the shelter. Once
the system has registered owners and articles, it is
possible to generate different queries and reports.
VI. CONCLUSIONS
When finishing the project, it was possible
to achieve the initial needs and inventory control
problems were resolved to benefit people. Guests
are aware that safeguard their belongings will be
guarded more reliable than those protection
resources commonly used.
This proposal allows a reliable control of
shelter guests to store personal items under guard,
5. Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56
www.ijera.com 55|P a g e
thus we know exactly the number of people
registered at the hostel. The benefit is that by
having information, decisions can be made in favor
of the place and the victims to offer better services.
The database is also reliable, is constantly
updated and items are safe. The software applies a
security level for the belongings of the guests; i.e.,
the information cannot be altered or deleted by
anyone; the only way to alter or delete is to have
the owner present, the ID card and PIN are the key
security of their belongings. This creates a high
level of security for all information that is handled
by the database, so, the project is the best option for
safeguarding objects and managing to reach the
goal of this work.
In addition to recording and control guests'
belongings, it is also possible to generate different
types of reports.
The results obtained in this proposal are
quite useful, either for guests or shelter managers,
these are the main benefits: efficiency, safety,
control, speed, and reliability.
Our application has some points that
would help improve the use of the prototype, first,
using mobile RFID readers (Smartphone) for
reading tags and managing information through a
mobile application, so it can be connected with
other applications either distributed or remotely.
And second, using high frequency and speed for
simultaneous reading tags.
In this work each object in the shelter is
properly registered and identified, thus fulfilling
one of the purposes of IoT, every "thing" can be
treated as an object connected to the Internet.
ACKNOWLEDGEMENTS
The authors would like to thank Alejandro
Sánchez Vinagre and Francisco Javier Cerino
Castro for programming the prototype. This paper
was supported by CONACYT through FOMIX-
TAB CONACYT - Gobierno del Estado de
Tabasco, Grant Number: TAB-2014-C29-245877.
We would also like to express our gratitude to the
Juarez Autonomous University of Tabasco for
supporting the academic resources needed for this
research.
REFERENCES
[1]. D. Giusto, A. Iera; G. Morabito; and L.
Atzori, The Internet of Things. Springer-
Verlag, 2010.
[2]. L. Atzori, A. Iera, and G. Morabito “The
internet of things: A survey,” Computer
Networks, vol. 54, no. 15, pp. 2787 –
2805, 2010.
[3]. D. Miorandi, S. Sicari, F. D. Pellegrini;
and I. Chlamtac “Internet of things:
Vision, applications and research
challenges,” Ad Hoc Networks, vol. 10,
no. 7, pp. 1497 – 1516, 2012.
[4]. J. Gubbi, R. Buyya, S. Marusic, and M.
Palaniswami. “Internet of things (IoT): A
vision, architectural elements, and future
directions,” Future Generation Computer
Systems, vol. 29, no. 7, pp. 1645 – 1660,
2013.
[5]. R. Caceres and A. Friday. “Ubicomp
systems at 20: Progress, opportu- nities,
and challenges,” IEEE Pervasive
Computing, vol. 11, no. 1, pp. 14–21,
January 2012.
[6]. W. Kang and Y. Shibata, “Performance
Evaluation of Disaster In- formation
System Based on P2P network,” in
Advanced Information Networking and
Applications Workshops (WAINA), 2010
IEEE 24th International Conference on,
20-23 2010, pp. 710 –715.
[7]. J. Kim, D. Kim, S. Jung, M. Lee; K.Kim;
C.Lee, J. Nah, S. Lee, J. Kim, W. Choi,
and S. Yoo, “Implementation and
Performance Evaluation of Mobile Ad
Hoc network for Emergency Telemedicine
System in Disaster Areas,” in Engineering
in Medicine and Biology Society, 2009.
EMBC 2009. Annual International
Conference of the IEEE, 3-6 2009, pp.
1663 –1666.
[8]. S. Saha and M. Matsumoto. “A
Framework for Data Collection and
Wireless Sensor Network Protocol for
Disaster Management,” in Proceedings of
the Second International Conference on
COMmunication System softWAre and
MiddlewaRE (COMSWARE 2007)
Bangalore, India. IEEE, January 2007, pp.
7–12.
[9]. Y. Shibata, Y. Sato, N. Ogasawara, and G.
Chiba. “A Disaster In- formation System
by Ballooned Wireless Adhoc Network,”
Complex, Intelligent and Software
Intensive Systems, International
Conference, vol. 0, pp. 299–304, 2009.
[10]. Wister M. A., Acosta F., Pancardo P., and
Hernandez-Nolasco J. A. “Towards An
Intelligent Environment for Urban Flood
Rescue Scenar- ios,” International Journal
of Engineering Research and Applications
(IJERA), pp. 1040–1044, Sep-Oct 2013.
[11]. Wister M. A., Pancardo P., Acosta F.,
Hernández-Nolasco J. A., and Sanchez E.
“Experiences with RFID technology to
manage information during natural
disasters,” in The 9-th International
Conference on Innovative Mobile and
Internet Services in Ubiquous Computing
6. Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56
www.ijera.com 56|P a g e
(IMIS 2015) (IMIS-2015), Blumenau,
Brazil, Jul. 2015.
[12]. ALERT. “ALERT USER GROUP system
organization.
http://www.alertsystems.org,” 2012.
[13]. Sudhneer M. Wireless Sensor Network for
Disaster Monitoring, ser.
WirelessSensorNetworks:Application-
CentricDesign. InTech.JanezaTrdine 9,
51000 Rijeka, Croatia, December 2010.
[14]. Fantacci R; Vanneschi M; Bertolli C;
Mencagli G, and Tarchi D. “Next
generation grids and wireless
communication networks: towards a novel
integrated approach,” Wirel. Commun.
Mob. Comput., vol. 9, no. 4, pp. 445–467,
2009.
[15]. Portillo J; Bermejo A; and Bernardos, A.
Tecnología de
identificaciónporradiofrecuencia (RFID):
aplicaciones en el ámbito de la salud.
Madrid España: Biblioteca virtual de la
Consejería de la Comunidad de Madrid,
2005.