SlideShare a Scribd company logo
Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56
www.ijera.com 51|P a g e
RFID Smart Tags for Controlling Belonging in Shelters
Miguel A. Wister*, Pablo Pancardo Garcia*, Jose A. Hernandez-Nolasco*,
Francisco Diego Acosta Escalante* and Pablo Payro Campos*
*(Academic Division of Information Technology and Systems, Juarez Autonomous University of Tabasco.
Cunduacan, Tabasco, Mexico.)
ABSTRACT
It is very important to identify each belongings to its owner to prevent these things get lost. A traditional way is
to label or paste barcodes to every objects. Currently, there are emerging technologies that allow us to label
everything, person or place. This paper presents a solution based on RFID technology (Radio Frequency
Identification) for identifying objects in a temporary shelter. To do this, a computer application is used to
control the incoming and outgoing of the personal belongings of victims rescued from a natural disaster, this
application is used in temporary shelters. Our solution allows communication between a reader and RFID tags,
just as the application accesses a database to store the information needed to control personal belongings of
affected people. The application attempts to reduce risks of loss of belongings and information, allowing the
identification of each object when located within the radius of coverage of the reader, showing the information
associated with the items (objects) and owner.
Keywords:RFID tag, IoT, Mobile Applications.
I. INTRODUCTION
Connect all things to the Internet is a
recent trend that has been called Internet of Things
(IoT), the concept of IoT is a new topic in the field
of wireless technology. In IoT everything is
connected. IoT describes the ubiquitous presence of
a variety of devices such as sensors, actuators, and
smartphones or mobile phones through unique
addressing schemes, allowing all these items to
interact and cooperate with each other to achieve
common objectives [1].
In [2] it is mentioned that Internet of
Things as a paradigm result of the convergence of
three different visions: Internet-oriented vision
(middleware), oriented things vision (sensors) and
oriented semantics vision (knowledge). In various
previous works dealing with these terms [3] [4].
To achieve a complete vision of IoT and
storage resources is essential to cloud computing.
Cloud computing is the latest model to emerge that
promises reliable services delivered through data
centers next-generation technologies that are based
on virtualized storage. Cloud acts as a data receiver
of the ubiquitous computing sensors; as a computer
to analyze and interpret data; and provide the user
easily to understand display based on the Web [5].
Therefore, it is possible to use the concept
of IoT to provide communication capabilities for a
device that could promptly alert a population
before a natural disaster.
Before using sensors built into the IoT
("Things" -oriented view) some works have been
proposed for disaster [6] [7] [8] [9]. Specifically
"things" vision-oriented functions as [10] [11]
where RFID technology is used. However, we are
particularly interested in applications that focus on
flood disasters. For example, the ALERT system to
advice for flood [12]. This system uses remote
sensing to transmit environmental data to a
computer system. Some sensors installed in the
warning system are used to detect rain, water level,
and meteorological data. These sensors provide
information to the system into a centralized
database. Another example is found in [13], here
there is a detection system using a landslide WSN
(Wireless Sensor Network). This mentioned system
is more convenient since it provides an early
warning and allows learning about the phenomena
of natural disasters.
Currently, systems, emergency
management, and disaster recovery include several
parts such as a communication infrastructure and a
system of information management [14].
II. BACKGROUND
As we mentioned above, we are interested
in flooding scenarios. Tabasco state represents a
high-risk scenario because the flooding by rains
that have occurred in recent years, these torrential
rains have caused extensive damage to
infrastructure, materials, and human losses.
During a flood caused by overflowing
rivers due to torrential rains, a high percentage of
homes are damaged, and therefore the habitats and
owners of these homes take refuge in temporary
shelters for protection, treatment and to be provided
with food, medicines and a place to stay.
RESEARCH ARTICLE OPEN ACCESS
Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56
www.ijera.com 52|P a g e
These natural disasters are common events
in the history of Tabasco, therefore, shelters for the
people that leave their homes because of these
phenomena are frequently. There are families who
arrive at these shelters with few personal
belongings that they could save from their homes,
which should be managed and stored properly.
In such disasters, people are afraid of
losing their belongings that still remain, since
facilities in shelters do not have an efficient control
of goods. While some few shelters the control is
carried out on printed formats, most of the shelters
in Tabasco do not have a control system that
identifies the victims’ personal belongings, hence, a
solution that solves this problem is necessary.
Traditionally, things (objects) are
inventoried in many ways, one of which has been
just to fill printed formats, otherwise is the use of a
marker to write a code on these objects to identify
them. From these codes is created a list, in the best
case, is registered into a table or worksheet file.
One more modern technique is to paste a barcode
sticker to each object in order to save the identity
and belongings. Although the techniques
mentioned above are very commonly used, they are
not completely reliable and secure to identify and
control belongings. Consequently, it is proposed to
use RFID smart tag technology.
Technology Radio Frequency
Identification RFID (Radio Frequency
IDentification) is undoubtedly one of the
technologies that have experienced faster growth
and sustained in recent times.
The current existence of viable RFID-
based applications is due to the development of
three main technological areas: a) Radio Frequency
Electronics, it is necessary for the development of
antennas and radio frequency systems present in
the RFID tags; b) Information technology, in
computing and communications it is necessary to
associate the reader with the smart tag through an
information system; and c) materials technology, it
is necessary for to reduce cost of the smart tags.
The possibilities offered by remote
reading of the information contained on a tag,
without physical contact, along with the ability to
perform multiple readings simultaneously, open the
door to a very large set of applications in a variety
of fields, from inventory control, location of people
and property, security or access control [15].
Barcodes, smart tags, and other
technologies withstand extreme temperatures,
humidity, acids, solvents, paint, grease, among
other damaging agents and also provide a unique
code, cannot be repeated, they are ergonomic, its
use is more flexible because they prevent straying.
III. ARCHITECTURAL DESIGN
To implement the solution we used the
methodology based on RUP model because it
tracks the best features of the software processes so
that implement many of the best principles of agile
development, so we can evaluate all phases that
compose it.
Development software and language,
reader/writer RFID and RFID tags
To develop and operate the prototype, we
used a PC based on Windows 7 (64-bit) and
corresponding drivers needed to operate the
reader/writer RFID (D2XX and VCP), which were
installed to generate a COM port to connect the
RFID reader/writer and the PC. The programming
language used to develop the prototype was C#, the
IDE was Microsoft Visual Studio. The database
management system was MySQL.
We used a multi ISO RFID reader (OK
5553) to read/write on tags (see Fig. 1). This reader
contains a module for integration with RS-232
connectivity, compatible with ISO standards
14443, ISO 14443B, ISO 15693, ISO 18000-3,
EPC RFID devices, Mifare, NFC and ICODE. This
RFID reader can read Multi ISO tags, that can
communicate with Philips MIFARE family and
labels with standard ISO 15693, ISO 14443,
ISO14443, ISO 18000-3, EPC and UID tags.
Fig 1. Multi ISO Reader (OK 5553) RFID for
reading and writing on cards and tags.
The application allows writing and reading
on two types of RFID tags: Tag Mifare (ISO
14443) and RFID (ISO 15693 card (see Fig 2).
Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56
www.ijera.com 53|P a g e
Fig 2.Mifare (ISO 14443) and RFID (ISO 15693)
tags for recording personal data of owners (guest).
IV. DEVELOPING
In an object control application, the
priority is to achieve a risk reduction so that
personal items are safe and no wanderings of those
objects. Write over an object code or registration
for inventory it is not safe, because after writing it,
we have to score the same code in a notebook or an
electronic format, running the risk that may be
confused with a letter or number, which it would
affect the identification of the owner and similarly
the registration or code is written with down, which
runs the risk of wearing out and is erased or
illegible, plus it would still be an antiquated and
tedious process.
The proposal of this work is to develop an
application that interacts with a reader / writer
RFID and can display data read from a tag attached
to the object. This data can be stored in a database
that records information on the contents of the
object, amount, location, owner, etc. Identity
information obtained with the reader / writer
corresponds to that found in the database and
displayed to the user with everything that contains
the record.
It is considered that the system is able to
provide risk reduction control to be able to show at
any time the user information stored in the database
system.
The main objective of the solution is to
design a computer system based on RFID
technology that takes control of the guest’s
personal belongings hosted in a temporary shelter.
In addition to building software to read data from a
RFID tag located on an object and personal
identification of the owner, it is necessary to have a
database that stores the information read from
RFID tags and it is constantly up to date. And
validate that the information stored in the database
is complete and correct.
With RFID technology, personnel
responsible for inspection of objects in shelters,
they manage to know precisely and in real time
how many and what type of objects are in the
warehouses of shelters and even the data owner
listed, improving thus integrated warehouse
management of shelters. Similarly, if the RFID
application is combined with other technologies
such as tracking systems, video cameras and other
surveillance related elements, it becomes a more
useful tool to prevent theft in stores shelters.
While designing the application is
submitted inventory control object, it should be
noted that all activities commonly inventory control
handles are not used.
Analysis and design
Turning to more specific aspects of
design, project development model used is
prototyping, since the intention was to create a first
model that serves to build similar. The prototype
was the result of the analysis and design of a
proposal to control objects in a typical shelter.
The prototype was built in a short time
using the appropriate programs and without using
many resources. We used object-oriented
programming (OOP) in C# language. C# uses OOP
and works with .NET environment.
Regarding to the database design, in
Figure 3 is shown the structure of the RFID
database, relations with their respective prototype
and fields of the RFID database. The database
design fulfills the standards of the relational model
required for optimum performance. The application
uses four tables: propietario (owner), usuarios
(users), almacen (stock), and articulos (items).
Fig 3. Tables: propietario, almacen, usuarios,
articulos (owner, stock, users, items).
V. EXPERIMENTAL RESULTS
In order to check reading and writing
operations on a tag, we made tests with the
reader/writer (Multi ISO RFID). All tests (ID
detection, data reading, and data writing
operations) have been completed and all data have
been checked to validate the appropriate
processing.
Initially, data of refugees are stored in the
database. CURP (ID) is the identifier or primary
key for each user, this value is the unique field that
is stored on the bracelet, other data users are stored
in the database that resides on the hard disk.
Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56
www.ijera.com 54|P a g e
Implementation
To carry out the tests of the application,
we printed commons items (radios, TV, watches,
home appliances, among others) to simulate
belongings of the victims in shelters. Those images
were printed on acetate sheets and RFID sticker
was pasted on each acetate sheet in order to
simulate the labeling associated to the belongings,
an example can be seen in Figure 4.
Subsequently, many items marked were
recorded with a RFID tag and stored in the
database with its unique identification, description
and the relevant association to an owner, so an
article can only belong to one owner, however, an
owner may have associated multiple items.
Fig 4.Smart tags to identify or label belongings
(objects).
Figures 5 and 6 are shown four ID cards
labeled with photographs and personal data of the
victims (owners of the items). Here are presented
such identifications that serve as examples of cards
that users show as owners items that they bring and
will be registered when entering into the shelter;
these cards must be the "ID" from the same person,
in this case may be the CURP. In addition to
containing physical identification within the RFID
chip, on the back side of the label owner also
brings labeled a barcode and QR code that points to
a link to expand the information about the person.
Fig 5. ID cards owners of objects or assets (front).
Each card has an RFID card.
Fig 6.Owner’s ID cards (rear).
The final product is shown below and
describes the initial interface of the developed
system.
Fig 7. Interface to the application.
In Fig. 7 the first interface that appears to
start the prototype shown. This screen is to
authenticate, must fill the fields username and
password to start the application.
Fig 8. Interface in the application for registration of
owners.
In Fig 8 is shown an example in order to
store personal data of an owner of items in the
database. We tap the card on the tag reader, to fill
the data stored into the database and select the
button "to generate id" followed by "save" option,
so the ID card owner and their data are stored.
We write all RFID cards to each owner of
belongings and each RFID tag to the items that the
guests brought when arriving at the shelter. Once
the system has registered owners and articles, it is
possible to generate different queries and reports.
VI. CONCLUSIONS
When finishing the project, it was possible
to achieve the initial needs and inventory control
problems were resolved to benefit people. Guests
are aware that safeguard their belongings will be
guarded more reliable than those protection
resources commonly used.
This proposal allows a reliable control of
shelter guests to store personal items under guard,
Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56
www.ijera.com 55|P a g e
thus we know exactly the number of people
registered at the hostel. The benefit is that by
having information, decisions can be made in favor
of the place and the victims to offer better services.
The database is also reliable, is constantly
updated and items are safe. The software applies a
security level for the belongings of the guests; i.e.,
the information cannot be altered or deleted by
anyone; the only way to alter or delete is to have
the owner present, the ID card and PIN are the key
security of their belongings. This creates a high
level of security for all information that is handled
by the database, so, the project is the best option for
safeguarding objects and managing to reach the
goal of this work.
In addition to recording and control guests'
belongings, it is also possible to generate different
types of reports.
The results obtained in this proposal are
quite useful, either for guests or shelter managers,
these are the main benefits: efficiency, safety,
control, speed, and reliability.
Our application has some points that
would help improve the use of the prototype, first,
using mobile RFID readers (Smartphone) for
reading tags and managing information through a
mobile application, so it can be connected with
other applications either distributed or remotely.
And second, using high frequency and speed for
simultaneous reading tags.
In this work each object in the shelter is
properly registered and identified, thus fulfilling
one of the purposes of IoT, every "thing" can be
treated as an object connected to the Internet.
ACKNOWLEDGEMENTS
The authors would like to thank Alejandro
Sánchez Vinagre and Francisco Javier Cerino
Castro for programming the prototype. This paper
was supported by CONACYT through FOMIX-
TAB CONACYT - Gobierno del Estado de
Tabasco, Grant Number: TAB-2014-C29-245877.
We would also like to express our gratitude to the
Juarez Autonomous University of Tabasco for
supporting the academic resources needed for this
research.
REFERENCES
[1]. D. Giusto, A. Iera; G. Morabito; and L.
Atzori, The Internet of Things. Springer-
Verlag, 2010.
[2]. L. Atzori, A. Iera, and G. Morabito “The
internet of things: A survey,” Computer
Networks, vol. 54, no. 15, pp. 2787 –
2805, 2010.
[3]. D. Miorandi, S. Sicari, F. D. Pellegrini;
and I. Chlamtac “Internet of things:
Vision, applications and research
challenges,” Ad Hoc Networks, vol. 10,
no. 7, pp. 1497 – 1516, 2012.
[4]. J. Gubbi, R. Buyya, S. Marusic, and M.
Palaniswami. “Internet of things (IoT): A
vision, architectural elements, and future
directions,” Future Generation Computer
Systems, vol. 29, no. 7, pp. 1645 – 1660,
2013.
[5]. R. Caceres and A. Friday. “Ubicomp
systems at 20: Progress, opportu- nities,
and challenges,” IEEE Pervasive
Computing, vol. 11, no. 1, pp. 14–21,
January 2012.
[6]. W. Kang and Y. Shibata, “Performance
Evaluation of Disaster In- formation
System Based on P2P network,” in
Advanced Information Networking and
Applications Workshops (WAINA), 2010
IEEE 24th International Conference on,
20-23 2010, pp. 710 –715.
[7]. J. Kim, D. Kim, S. Jung, M. Lee; K.Kim;
C.Lee, J. Nah, S. Lee, J. Kim, W. Choi,
and S. Yoo, “Implementation and
Performance Evaluation of Mobile Ad
Hoc network for Emergency Telemedicine
System in Disaster Areas,” in Engineering
in Medicine and Biology Society, 2009.
EMBC 2009. Annual International
Conference of the IEEE, 3-6 2009, pp.
1663 –1666.
[8]. S. Saha and M. Matsumoto. “A
Framework for Data Collection and
Wireless Sensor Network Protocol for
Disaster Management,” in Proceedings of
the Second International Conference on
COMmunication System softWAre and
MiddlewaRE (COMSWARE 2007)
Bangalore, India. IEEE, January 2007, pp.
7–12.
[9]. Y. Shibata, Y. Sato, N. Ogasawara, and G.
Chiba. “A Disaster In- formation System
by Ballooned Wireless Adhoc Network,”
Complex, Intelligent and Software
Intensive Systems, International
Conference, vol. 0, pp. 299–304, 2009.
[10]. Wister M. A., Acosta F., Pancardo P., and
Hernandez-Nolasco J. A. “Towards An
Intelligent Environment for Urban Flood
Rescue Scenar- ios,” International Journal
of Engineering Research and Applications
(IJERA), pp. 1040–1044, Sep-Oct 2013.
[11]. Wister M. A., Pancardo P., Acosta F.,
Hernández-Nolasco J. A., and Sanchez E.
“Experiences with RFID technology to
manage information during natural
disasters,” in The 9-th International
Conference on Innovative Mobile and
Internet Services in Ubiquous Computing
Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56
www.ijera.com 56|P a g e
(IMIS 2015) (IMIS-2015), Blumenau,
Brazil, Jul. 2015.
[12]. ALERT. “ALERT USER GROUP system
organization.
http://www.alertsystems.org,” 2012.
[13]. Sudhneer M. Wireless Sensor Network for
Disaster Monitoring, ser.
WirelessSensorNetworks:Application-
CentricDesign. InTech.JanezaTrdine 9,
51000 Rijeka, Croatia, December 2010.
[14]. Fantacci R; Vanneschi M; Bertolli C;
Mencagli G, and Tarchi D. “Next
generation grids and wireless
communication networks: towards a novel
integrated approach,” Wirel. Commun.
Mob. Comput., vol. 9, no. 4, pp. 445–467,
2009.
[15]. Portillo J; Bermejo A; and Bernardos, A.
Tecnología de
identificaciónporradiofrecuencia (RFID):
aplicaciones en el ámbito de la salud.
Madrid España: Biblioteca virtual de la
Consejería de la Comunidad de Madrid,
2005.

More Related Content

What's hot

Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Scientific Review SR
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
 
NFC Everywhere Brochure 2016
NFC Everywhere Brochure 2016NFC Everywhere Brochure 2016
NFC Everywhere Brochure 2016Laurent Dardé
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
ijtsrd
 
Rfid library management
Rfid library managementRfid library management
Rfid library management
Saurav Suman
 
The Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital IdentificationThe Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital Identification
INPI ASIA Admin
 
RFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDRFID Library Automation - ETS RFID
RFID Library Automation - ETS RFID
EcoTrackSystemsETSRF
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
Ahmad Sharifi
 
Autdsi gvi
Autdsi gviAutdsi gvi
Autdsi gvi
L2MM
 
Watermarking
WatermarkingWatermarking
Watermarking
Pushkar Dutt
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
IJECEIAES
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
Editor IJCATR
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
OECLIB Odisha Electronics Control Library
 
5 context aware services
5 context aware services5 context aware services
5 context aware servicesguest3cf4991
 

What's hot (19)

IQ-R_catalog
IQ-R_catalogIQ-R_catalog
IQ-R_catalog
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
NFC Everywhere Brochure 2016
NFC Everywhere Brochure 2016NFC Everywhere Brochure 2016
NFC Everywhere Brochure 2016
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
 
Rfid library management
Rfid library managementRfid library management
Rfid library management
 
The Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital IdentificationThe Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital Identification
 
RFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDRFID Library Automation - ETS RFID
RFID Library Automation - ETS RFID
 
Wisekey italia presentation 2012
Wisekey italia presentation 2012Wisekey italia presentation 2012
Wisekey italia presentation 2012
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
Autdsi gvi
Autdsi gviAutdsi gvi
Autdsi gvi
 
Watermarking
WatermarkingWatermarking
Watermarking
 
RFID for Modern Libraries
RFID for Modern Libraries RFID for Modern Libraries
RFID for Modern Libraries
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
5 context aware services
5 context aware services5 context aware services
5 context aware services
 

Viewers also liked

Linguagem do amor
Linguagem do amorLinguagem do amor
Linguagem do amor
Eduardo Sousa Gomes
 
Ativ 3 unidade3-planodeaulajoanaviana
Ativ 3 unidade3-planodeaulajoanavianaAtiv 3 unidade3-planodeaulajoanaviana
Ativ 3 unidade3-planodeaulajoanavianajjoana06
 
Egipto para c. f.
Egipto  para c. f.Egipto  para c. f.
Egipto para c. f.carlos2627
 
iLucas HQ
iLucas HQiLucas HQ
Apostila matematica aplicada
Apostila matematica aplicadaApostila matematica aplicada
Apostila matematica aplicadagabaritocontabil
 
Matematica slides amortizacao2
Matematica slides amortizacao2Matematica slides amortizacao2
Matematica slides amortizacao2gabaritocontabil
 
Contabilidade geral i cap 11 slides - pfc - i
Contabilidade geral i cap 11   slides - pfc - iContabilidade geral i cap 11   slides - pfc - i
Contabilidade geral i cap 11 slides - pfc - igabaritocontabil
 
Indicadores Macroeconomico UFT
Indicadores Macroeconomico UFTIndicadores Macroeconomico UFT
Indicadores Macroeconomico UFT
Rosaduarte1202
 
Matematica exercicios lista amortiza_o_i_gabarito2
Matematica exercicios lista amortiza_o_i_gabarito2Matematica exercicios lista amortiza_o_i_gabarito2
Matematica exercicios lista amortiza_o_i_gabarito2gabaritocontabil
 
Crecimiento, competitividad, eficiencia. Gobierno de España.
Crecimiento, competitividad, eficiencia. Gobierno de España. Crecimiento, competitividad, eficiencia. Gobierno de España.
Crecimiento, competitividad, eficiencia. Gobierno de España.
ConsuladoGralESPenDUS
 
Assunto da semana umidade relativa(depoiss)
Assunto da semana   umidade relativa(depoiss)Assunto da semana   umidade relativa(depoiss)
Assunto da semana umidade relativa(depoiss)
Samantha Martins
 
Palacio domabahce em estambul
Palacio domabahce em estambulPalacio domabahce em estambul
Palacio domabahce em estambulcarlos2627
 
C:\fakepath\barbara santos
C:\fakepath\barbara santosC:\fakepath\barbara santos
C:\fakepath\barbara santos
literafro
 

Viewers also liked (20)

Linguagem do amor
Linguagem do amorLinguagem do amor
Linguagem do amor
 
Ativ 3 unidade3-planodeaulajoanaviana
Ativ 3 unidade3-planodeaulajoanavianaAtiv 3 unidade3-planodeaulajoanaviana
Ativ 3 unidade3-planodeaulajoanaviana
 
biosfera
biosferabiosfera
biosfera
 
Mis niños
Mis niñosMis niños
Mis niños
 
Contoh file
Contoh fileContoh file
Contoh file
 
Egipto para c. f.
Egipto  para c. f.Egipto  para c. f.
Egipto para c. f.
 
iLucas HQ
iLucas HQiLucas HQ
iLucas HQ
 
Apostila matematica aplicada
Apostila matematica aplicadaApostila matematica aplicada
Apostila matematica aplicada
 
Matematica slides amortizacao2
Matematica slides amortizacao2Matematica slides amortizacao2
Matematica slides amortizacao2
 
Contabilidade geral i cap 11 slides - pfc - i
Contabilidade geral i cap 11   slides - pfc - iContabilidade geral i cap 11   slides - pfc - i
Contabilidade geral i cap 11 slides - pfc - i
 
Indicadores Macroeconomico UFT
Indicadores Macroeconomico UFTIndicadores Macroeconomico UFT
Indicadores Macroeconomico UFT
 
Matematica exercicios lista amortiza_o_i_gabarito2
Matematica exercicios lista amortiza_o_i_gabarito2Matematica exercicios lista amortiza_o_i_gabarito2
Matematica exercicios lista amortiza_o_i_gabarito2
 
Crecimiento, competitividad, eficiencia. Gobierno de España.
Crecimiento, competitividad, eficiencia. Gobierno de España. Crecimiento, competitividad, eficiencia. Gobierno de España.
Crecimiento, competitividad, eficiencia. Gobierno de España.
 
B&R Consultoria Qualidade no meio ambiente
B&R Consultoria Qualidade no meio ambienteB&R Consultoria Qualidade no meio ambiente
B&R Consultoria Qualidade no meio ambiente
 
Gestão logística
Gestão logísticaGestão logística
Gestão logística
 
Assunto da semana umidade relativa(depoiss)
Assunto da semana   umidade relativa(depoiss)Assunto da semana   umidade relativa(depoiss)
Assunto da semana umidade relativa(depoiss)
 
Cila apresentação1
Cila apresentação1Cila apresentação1
Cila apresentação1
 
Palacio domabahce em estambul
Palacio domabahce em estambulPalacio domabahce em estambul
Palacio domabahce em estambul
 
C:\fakepath\barbara santos
C:\fakepath\barbara santosC:\fakepath\barbara santos
C:\fakepath\barbara santos
 
Test
TestTest
Test
 

Similar to RFID Smart Tags for Controlling Belonging in Shelters

Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Editor IJARCET
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
ijccsa
 
Complex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on ArduinoComplex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on Arduino
neirew J
 
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
IJCNCJournal
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET Journal
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
IRJET Journal
 
Smart Home Security and Intrusion Detection System
Smart Home Security and Intrusion Detection SystemSmart Home Security and Intrusion Detection System
Smart Home Security and Intrusion Detection System
ijtsrd
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
KanagarajanSwamiappa
 
Internet of Things IoT Based Smart Environment Integrating Various Business A...
Internet of Things IoT Based Smart Environment Integrating Various Business A...Internet of Things IoT Based Smart Environment Integrating Various Business A...
Internet of Things IoT Based Smart Environment Integrating Various Business A...
ijtsrd
 
An Insight On RFID Technology And Future Challenges
An Insight On RFID Technology And Future ChallengesAn Insight On RFID Technology And Future Challenges
An Insight On RFID Technology And Future Challenges
Sarah Adams
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
Akanksha Prasad
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
IJERA Editor
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
IJERA Editor
 
Internet of Things: Definition, Applications, Issues and Future Prospective
Internet of Things: Definition, Applications, Issues and Future ProspectiveInternet of Things: Definition, Applications, Issues and Future Prospective
Internet of Things: Definition, Applications, Issues and Future Prospective
rahulmonikasharma
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
IRJET Journal
 
IoT Smart keychain finder project
IoT Smart keychain finder project IoT Smart keychain finder project
IoT Smart keychain finder project
RShkShrm
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)
SimiAttri
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Novel Tracking System to Enhance Child Prudent Using Face Recognition
Novel Tracking System to Enhance Child Prudent Using Face RecognitionNovel Tracking System to Enhance Child Prudent Using Face Recognition
Novel Tracking System to Enhance Child Prudent Using Face Recognition
Association of Scientists, Developers and Faculties
 

Similar to RFID Smart Tags for Controlling Belonging in Shelters (20)

Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
 
Complex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on ArduinoComplex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on Arduino
 
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
 
Smart Home Security and Intrusion Detection System
Smart Home Security and Intrusion Detection SystemSmart Home Security and Intrusion Detection System
Smart Home Security and Intrusion Detection System
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
Internet of Things IoT Based Smart Environment Integrating Various Business A...
Internet of Things IoT Based Smart Environment Integrating Various Business A...Internet of Things IoT Based Smart Environment Integrating Various Business A...
Internet of Things IoT Based Smart Environment Integrating Various Business A...
 
An Insight On RFID Technology And Future Challenges
An Insight On RFID Technology And Future ChallengesAn Insight On RFID Technology And Future Challenges
An Insight On RFID Technology And Future Challenges
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Internet of Things: Definition, Applications, Issues and Future Prospective
Internet of Things: Definition, Applications, Issues and Future ProspectiveInternet of Things: Definition, Applications, Issues and Future Prospective
Internet of Things: Definition, Applications, Issues and Future Prospective
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
IoT Smart keychain finder project
IoT Smart keychain finder project IoT Smart keychain finder project
IoT Smart keychain finder project
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Novel Tracking System to Enhance Child Prudent Using Face Recognition
Novel Tracking System to Enhance Child Prudent Using Face RecognitionNovel Tracking System to Enhance Child Prudent Using Face Recognition
Novel Tracking System to Enhance Child Prudent Using Face Recognition
 

Recently uploaded

一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 

Recently uploaded (20)

一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 

RFID Smart Tags for Controlling Belonging in Shelters

  • 1. Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56 www.ijera.com 51|P a g e RFID Smart Tags for Controlling Belonging in Shelters Miguel A. Wister*, Pablo Pancardo Garcia*, Jose A. Hernandez-Nolasco*, Francisco Diego Acosta Escalante* and Pablo Payro Campos* *(Academic Division of Information Technology and Systems, Juarez Autonomous University of Tabasco. Cunduacan, Tabasco, Mexico.) ABSTRACT It is very important to identify each belongings to its owner to prevent these things get lost. A traditional way is to label or paste barcodes to every objects. Currently, there are emerging technologies that allow us to label everything, person or place. This paper presents a solution based on RFID technology (Radio Frequency Identification) for identifying objects in a temporary shelter. To do this, a computer application is used to control the incoming and outgoing of the personal belongings of victims rescued from a natural disaster, this application is used in temporary shelters. Our solution allows communication between a reader and RFID tags, just as the application accesses a database to store the information needed to control personal belongings of affected people. The application attempts to reduce risks of loss of belongings and information, allowing the identification of each object when located within the radius of coverage of the reader, showing the information associated with the items (objects) and owner. Keywords:RFID tag, IoT, Mobile Applications. I. INTRODUCTION Connect all things to the Internet is a recent trend that has been called Internet of Things (IoT), the concept of IoT is a new topic in the field of wireless technology. In IoT everything is connected. IoT describes the ubiquitous presence of a variety of devices such as sensors, actuators, and smartphones or mobile phones through unique addressing schemes, allowing all these items to interact and cooperate with each other to achieve common objectives [1]. In [2] it is mentioned that Internet of Things as a paradigm result of the convergence of three different visions: Internet-oriented vision (middleware), oriented things vision (sensors) and oriented semantics vision (knowledge). In various previous works dealing with these terms [3] [4]. To achieve a complete vision of IoT and storage resources is essential to cloud computing. Cloud computing is the latest model to emerge that promises reliable services delivered through data centers next-generation technologies that are based on virtualized storage. Cloud acts as a data receiver of the ubiquitous computing sensors; as a computer to analyze and interpret data; and provide the user easily to understand display based on the Web [5]. Therefore, it is possible to use the concept of IoT to provide communication capabilities for a device that could promptly alert a population before a natural disaster. Before using sensors built into the IoT ("Things" -oriented view) some works have been proposed for disaster [6] [7] [8] [9]. Specifically "things" vision-oriented functions as [10] [11] where RFID technology is used. However, we are particularly interested in applications that focus on flood disasters. For example, the ALERT system to advice for flood [12]. This system uses remote sensing to transmit environmental data to a computer system. Some sensors installed in the warning system are used to detect rain, water level, and meteorological data. These sensors provide information to the system into a centralized database. Another example is found in [13], here there is a detection system using a landslide WSN (Wireless Sensor Network). This mentioned system is more convenient since it provides an early warning and allows learning about the phenomena of natural disasters. Currently, systems, emergency management, and disaster recovery include several parts such as a communication infrastructure and a system of information management [14]. II. BACKGROUND As we mentioned above, we are interested in flooding scenarios. Tabasco state represents a high-risk scenario because the flooding by rains that have occurred in recent years, these torrential rains have caused extensive damage to infrastructure, materials, and human losses. During a flood caused by overflowing rivers due to torrential rains, a high percentage of homes are damaged, and therefore the habitats and owners of these homes take refuge in temporary shelters for protection, treatment and to be provided with food, medicines and a place to stay. RESEARCH ARTICLE OPEN ACCESS
  • 2. Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56 www.ijera.com 52|P a g e These natural disasters are common events in the history of Tabasco, therefore, shelters for the people that leave their homes because of these phenomena are frequently. There are families who arrive at these shelters with few personal belongings that they could save from their homes, which should be managed and stored properly. In such disasters, people are afraid of losing their belongings that still remain, since facilities in shelters do not have an efficient control of goods. While some few shelters the control is carried out on printed formats, most of the shelters in Tabasco do not have a control system that identifies the victims’ personal belongings, hence, a solution that solves this problem is necessary. Traditionally, things (objects) are inventoried in many ways, one of which has been just to fill printed formats, otherwise is the use of a marker to write a code on these objects to identify them. From these codes is created a list, in the best case, is registered into a table or worksheet file. One more modern technique is to paste a barcode sticker to each object in order to save the identity and belongings. Although the techniques mentioned above are very commonly used, they are not completely reliable and secure to identify and control belongings. Consequently, it is proposed to use RFID smart tag technology. Technology Radio Frequency Identification RFID (Radio Frequency IDentification) is undoubtedly one of the technologies that have experienced faster growth and sustained in recent times. The current existence of viable RFID- based applications is due to the development of three main technological areas: a) Radio Frequency Electronics, it is necessary for the development of antennas and radio frequency systems present in the RFID tags; b) Information technology, in computing and communications it is necessary to associate the reader with the smart tag through an information system; and c) materials technology, it is necessary for to reduce cost of the smart tags. The possibilities offered by remote reading of the information contained on a tag, without physical contact, along with the ability to perform multiple readings simultaneously, open the door to a very large set of applications in a variety of fields, from inventory control, location of people and property, security or access control [15]. Barcodes, smart tags, and other technologies withstand extreme temperatures, humidity, acids, solvents, paint, grease, among other damaging agents and also provide a unique code, cannot be repeated, they are ergonomic, its use is more flexible because they prevent straying. III. ARCHITECTURAL DESIGN To implement the solution we used the methodology based on RUP model because it tracks the best features of the software processes so that implement many of the best principles of agile development, so we can evaluate all phases that compose it. Development software and language, reader/writer RFID and RFID tags To develop and operate the prototype, we used a PC based on Windows 7 (64-bit) and corresponding drivers needed to operate the reader/writer RFID (D2XX and VCP), which were installed to generate a COM port to connect the RFID reader/writer and the PC. The programming language used to develop the prototype was C#, the IDE was Microsoft Visual Studio. The database management system was MySQL. We used a multi ISO RFID reader (OK 5553) to read/write on tags (see Fig. 1). This reader contains a module for integration with RS-232 connectivity, compatible with ISO standards 14443, ISO 14443B, ISO 15693, ISO 18000-3, EPC RFID devices, Mifare, NFC and ICODE. This RFID reader can read Multi ISO tags, that can communicate with Philips MIFARE family and labels with standard ISO 15693, ISO 14443, ISO14443, ISO 18000-3, EPC and UID tags. Fig 1. Multi ISO Reader (OK 5553) RFID for reading and writing on cards and tags. The application allows writing and reading on two types of RFID tags: Tag Mifare (ISO 14443) and RFID (ISO 15693 card (see Fig 2).
  • 3. Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56 www.ijera.com 53|P a g e Fig 2.Mifare (ISO 14443) and RFID (ISO 15693) tags for recording personal data of owners (guest). IV. DEVELOPING In an object control application, the priority is to achieve a risk reduction so that personal items are safe and no wanderings of those objects. Write over an object code or registration for inventory it is not safe, because after writing it, we have to score the same code in a notebook or an electronic format, running the risk that may be confused with a letter or number, which it would affect the identification of the owner and similarly the registration or code is written with down, which runs the risk of wearing out and is erased or illegible, plus it would still be an antiquated and tedious process. The proposal of this work is to develop an application that interacts with a reader / writer RFID and can display data read from a tag attached to the object. This data can be stored in a database that records information on the contents of the object, amount, location, owner, etc. Identity information obtained with the reader / writer corresponds to that found in the database and displayed to the user with everything that contains the record. It is considered that the system is able to provide risk reduction control to be able to show at any time the user information stored in the database system. The main objective of the solution is to design a computer system based on RFID technology that takes control of the guest’s personal belongings hosted in a temporary shelter. In addition to building software to read data from a RFID tag located on an object and personal identification of the owner, it is necessary to have a database that stores the information read from RFID tags and it is constantly up to date. And validate that the information stored in the database is complete and correct. With RFID technology, personnel responsible for inspection of objects in shelters, they manage to know precisely and in real time how many and what type of objects are in the warehouses of shelters and even the data owner listed, improving thus integrated warehouse management of shelters. Similarly, if the RFID application is combined with other technologies such as tracking systems, video cameras and other surveillance related elements, it becomes a more useful tool to prevent theft in stores shelters. While designing the application is submitted inventory control object, it should be noted that all activities commonly inventory control handles are not used. Analysis and design Turning to more specific aspects of design, project development model used is prototyping, since the intention was to create a first model that serves to build similar. The prototype was the result of the analysis and design of a proposal to control objects in a typical shelter. The prototype was built in a short time using the appropriate programs and without using many resources. We used object-oriented programming (OOP) in C# language. C# uses OOP and works with .NET environment. Regarding to the database design, in Figure 3 is shown the structure of the RFID database, relations with their respective prototype and fields of the RFID database. The database design fulfills the standards of the relational model required for optimum performance. The application uses four tables: propietario (owner), usuarios (users), almacen (stock), and articulos (items). Fig 3. Tables: propietario, almacen, usuarios, articulos (owner, stock, users, items). V. EXPERIMENTAL RESULTS In order to check reading and writing operations on a tag, we made tests with the reader/writer (Multi ISO RFID). All tests (ID detection, data reading, and data writing operations) have been completed and all data have been checked to validate the appropriate processing. Initially, data of refugees are stored in the database. CURP (ID) is the identifier or primary key for each user, this value is the unique field that is stored on the bracelet, other data users are stored in the database that resides on the hard disk.
  • 4. Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56 www.ijera.com 54|P a g e Implementation To carry out the tests of the application, we printed commons items (radios, TV, watches, home appliances, among others) to simulate belongings of the victims in shelters. Those images were printed on acetate sheets and RFID sticker was pasted on each acetate sheet in order to simulate the labeling associated to the belongings, an example can be seen in Figure 4. Subsequently, many items marked were recorded with a RFID tag and stored in the database with its unique identification, description and the relevant association to an owner, so an article can only belong to one owner, however, an owner may have associated multiple items. Fig 4.Smart tags to identify or label belongings (objects). Figures 5 and 6 are shown four ID cards labeled with photographs and personal data of the victims (owners of the items). Here are presented such identifications that serve as examples of cards that users show as owners items that they bring and will be registered when entering into the shelter; these cards must be the "ID" from the same person, in this case may be the CURP. In addition to containing physical identification within the RFID chip, on the back side of the label owner also brings labeled a barcode and QR code that points to a link to expand the information about the person. Fig 5. ID cards owners of objects or assets (front). Each card has an RFID card. Fig 6.Owner’s ID cards (rear). The final product is shown below and describes the initial interface of the developed system. Fig 7. Interface to the application. In Fig. 7 the first interface that appears to start the prototype shown. This screen is to authenticate, must fill the fields username and password to start the application. Fig 8. Interface in the application for registration of owners. In Fig 8 is shown an example in order to store personal data of an owner of items in the database. We tap the card on the tag reader, to fill the data stored into the database and select the button "to generate id" followed by "save" option, so the ID card owner and their data are stored. We write all RFID cards to each owner of belongings and each RFID tag to the items that the guests brought when arriving at the shelter. Once the system has registered owners and articles, it is possible to generate different queries and reports. VI. CONCLUSIONS When finishing the project, it was possible to achieve the initial needs and inventory control problems were resolved to benefit people. Guests are aware that safeguard their belongings will be guarded more reliable than those protection resources commonly used. This proposal allows a reliable control of shelter guests to store personal items under guard,
  • 5. Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56 www.ijera.com 55|P a g e thus we know exactly the number of people registered at the hostel. The benefit is that by having information, decisions can be made in favor of the place and the victims to offer better services. The database is also reliable, is constantly updated and items are safe. The software applies a security level for the belongings of the guests; i.e., the information cannot be altered or deleted by anyone; the only way to alter or delete is to have the owner present, the ID card and PIN are the key security of their belongings. This creates a high level of security for all information that is handled by the database, so, the project is the best option for safeguarding objects and managing to reach the goal of this work. In addition to recording and control guests' belongings, it is also possible to generate different types of reports. The results obtained in this proposal are quite useful, either for guests or shelter managers, these are the main benefits: efficiency, safety, control, speed, and reliability. Our application has some points that would help improve the use of the prototype, first, using mobile RFID readers (Smartphone) for reading tags and managing information through a mobile application, so it can be connected with other applications either distributed or remotely. And second, using high frequency and speed for simultaneous reading tags. In this work each object in the shelter is properly registered and identified, thus fulfilling one of the purposes of IoT, every "thing" can be treated as an object connected to the Internet. ACKNOWLEDGEMENTS The authors would like to thank Alejandro Sánchez Vinagre and Francisco Javier Cerino Castro for programming the prototype. This paper was supported by CONACYT through FOMIX- TAB CONACYT - Gobierno del Estado de Tabasco, Grant Number: TAB-2014-C29-245877. We would also like to express our gratitude to the Juarez Autonomous University of Tabasco for supporting the academic resources needed for this research. REFERENCES [1]. D. Giusto, A. Iera; G. Morabito; and L. Atzori, The Internet of Things. Springer- Verlag, 2010. [2]. L. Atzori, A. Iera, and G. Morabito “The internet of things: A survey,” Computer Networks, vol. 54, no. 15, pp. 2787 – 2805, 2010. [3]. D. Miorandi, S. Sicari, F. D. Pellegrini; and I. Chlamtac “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497 – 1516, 2012. [4]. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami. “Internet of things (IoT): A vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645 – 1660, 2013. [5]. R. Caceres and A. Friday. “Ubicomp systems at 20: Progress, opportu- nities, and challenges,” IEEE Pervasive Computing, vol. 11, no. 1, pp. 14–21, January 2012. [6]. W. Kang and Y. Shibata, “Performance Evaluation of Disaster In- formation System Based on P2P network,” in Advanced Information Networking and Applications Workshops (WAINA), 2010 IEEE 24th International Conference on, 20-23 2010, pp. 710 –715. [7]. J. Kim, D. Kim, S. Jung, M. Lee; K.Kim; C.Lee, J. Nah, S. Lee, J. Kim, W. Choi, and S. Yoo, “Implementation and Performance Evaluation of Mobile Ad Hoc network for Emergency Telemedicine System in Disaster Areas,” in Engineering in Medicine and Biology Society, 2009. EMBC 2009. Annual International Conference of the IEEE, 3-6 2009, pp. 1663 –1666. [8]. S. Saha and M. Matsumoto. “A Framework for Data Collection and Wireless Sensor Network Protocol for Disaster Management,” in Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007) Bangalore, India. IEEE, January 2007, pp. 7–12. [9]. Y. Shibata, Y. Sato, N. Ogasawara, and G. Chiba. “A Disaster In- formation System by Ballooned Wireless Adhoc Network,” Complex, Intelligent and Software Intensive Systems, International Conference, vol. 0, pp. 299–304, 2009. [10]. Wister M. A., Acosta F., Pancardo P., and Hernandez-Nolasco J. A. “Towards An Intelligent Environment for Urban Flood Rescue Scenar- ios,” International Journal of Engineering Research and Applications (IJERA), pp. 1040–1044, Sep-Oct 2013. [11]. Wister M. A., Pancardo P., Acosta F., Hernández-Nolasco J. A., and Sanchez E. “Experiences with RFID technology to manage information during natural disasters,” in The 9-th International Conference on Innovative Mobile and Internet Services in Ubiquous Computing
  • 6. Miguel A. Wister .et al. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.51-56 www.ijera.com 56|P a g e (IMIS 2015) (IMIS-2015), Blumenau, Brazil, Jul. 2015. [12]. ALERT. “ALERT USER GROUP system organization. http://www.alertsystems.org,” 2012. [13]. Sudhneer M. Wireless Sensor Network for Disaster Monitoring, ser. WirelessSensorNetworks:Application- CentricDesign. InTech.JanezaTrdine 9, 51000 Rijeka, Croatia, December 2010. [14]. Fantacci R; Vanneschi M; Bertolli C; Mencagli G, and Tarchi D. “Next generation grids and wireless communication networks: towards a novel integrated approach,” Wirel. Commun. Mob. Comput., vol. 9, no. 4, pp. 445–467, 2009. [15]. Portillo J; Bermejo A; and Bernardos, A. Tecnología de identificaciónporradiofrecuencia (RFID): aplicaciones en el ámbito de la salud. Madrid España: Biblioteca virtual de la Consejería de la Comunidad de Madrid, 2005.