Monday, December 10, 2018

RFID in my Industry


 Introduction
The development of the business applications as well as the advancement in the technology has led strong urge and requirements in developing and implementing dynamic security in the computer systems. The main attributes implementing system security in the real life situation include the application monitoring and controlling of the computer system. The human security is highly limited due to the errors, the inaccuracy, and unreliability. The automation of the system is securing the industries against possible loss is vital and crucial for the economy of the particular industry. The Radio Frequency Identification (RFID) technology provides the right solution to the automation of the security problems within the business industries.  The major industries that apply the RFID technology include the automatic vehicle identification, the inventory management, the work – in – process, the container and yard management, the document and jewels tracking and the patient monitoring.
The problem definition
The vehicle industries have encountered the unsolved problem regarding the stolen vehicles and their recovery to the owners. The security issue regarding the stolen vehicles has increased leading to fear and worries on the methodologies suitable for recovering stolen vehicles. Most vehicles get lost, and some tomes fail to get way in which they can get traced back. The vehicle owners have also encountered the problem based on the monitoring the vehicle on transit. The vehicle owners require monitoring the vehicles used in transporting of goods and services for the security of the cargo and the container. The approach of monitoring and controlling the vehicle would solve the problems of the stolen vehicles and the lost items during the transportation process (Bolić, et at… 2010).The data and information of the vehicle based on the status of the goods and the vehicle desire to get recorded and stored by the managing team. The concerns of the clients and the trust of the vehicle owners require to get solved by implementing the security to the vehicle and the goods on transit.
General description of the business problem
The analysis research on the current system has indicated that the security of vehicle get compromised when the stolen vehicle or the transporting vehicle get into narrow streets as well as the high building blocks. The GPS signal is highly affected by the tall building, the valleys and the remote areas blocked by tall structures (Rawal, 2009). The GPS signals in the environments as mentioned earlier get weak and fail to get transmitted to the monitoring center. The signals displayed through the GPS within the blocked site have poor visibility making it difficult for the vehicle users to identify the monitored vehicle on the sharp bending and high steep environments. The stems initial systems indicated that the general system applied in monitoring and checking the vehicle using the GPS cause the high level of interrupt and overlapping causing g multipath problems at the receiving end. The research on the current GPS system indicated that the GPS location is never precise. The position provides at the monitoring center indicate that the vehicle monitored the present high level of position drift for the vehicle location. The utilization of the GPS technology in providing vehicle security and monitoring strategies has a lot of inconveniences. The technology does not guarantee high standards management that meets the user’s needs.
The vehicle monitoring industry has realized that the simple Global Positioning System (GPS) methodology has a limitation in determining the real location of the vehicle. The GPS technology alone does not provide the real-time information for the vehicle location especially when the vehicle is running. The monitoring problem becomes critical especially when the vehicle pass through the tunnels and the built ups. The achievement of a reliable car navigation system and technology is a requirement to facilitate easier and high positioning accuracy as desired in the requirement. The security of the vehicle requires the implementation of the up – to – date map database. The vehicle industry experience shortcoming in managing and controlling the vehicle security due to lack of sophisticated technology that allow real-time monitoring of vehicles as well as the accurate positioning of the vehicles. The current monitoring system requires improvement through the combination of the GPS plus other technologies to achieve a dynamic security control in the monitoring center. The vehicle monitoring center shall implement the proposed system in the maintenance and acquisition of the required system to ensure that the vehicle owners acquire the specific requirements as quoted in the requirement documents. The vehicle security and monitoring system shall get, solved through the implementation and the installation of the Global System for Mobile Communication (GSM). The GSM technology shall get embedded in the vehicle user mobile devices to enhance tracking of the vehicles in any place and location.
Overview of RFID
The RFID technology is an improvement of different technologies that support the technology of things in the entire global environment. The RFID technology uses the application of the electromagnetic waves to automate the process of searching, identifying and displaying people and the objects. The RFID technology incorporates the modules that enhance the automatic location and capturing of data and information.  The RFID technology has the composition of two main architectural components namely the transponder or the tag and the interrogator or the reader. The transponder gets embedded in the main object that requires get monitoring or identifying. The RFID tag technology is classified into two main categories namely the active RFID tag and the passive RFID tag. The passive RFID tags architecture does not contain the internal battery or the power sources. The active RFID tags have built-in batteries thus enabling them to work for long distances. The active RFID tags get designed in a manner that they never depend on other RFID enabled equipment like the nearby field or the interrogator to perform the transmission or the receiving functions.
The RFID reader has the built in antennae that enhance the reading, the interrogation and the writing of the tags.  The RFID reader device detects and identifies the tags attached or embedded to the selected item. The RFID reader device communicates with the tag via the reader antenna.  The antennae broadcast the data and the information through the electromagnetic radio frequency waves to the tag. The tag responds by sending the feedback that contains the signals corresponding to the location of the readings. The reader identifies the feedback from the tag then the reader decodes the information as it sends it to the middleware. The process involves the establishment of the communication sessions that get initialized through the exchange of the identification data and information. The identification process occurs by the reader sending the request signals to the tags within the nearby field. The tag that receives the requested signal responds by sending the identification data and information (Zhang, et al… 2014).  The communication session gets established through the established sessions to avoid biases and the collision of the data, and information exchanged.
Business justification
The vehicle industry requires a sophisticated system that guarantees that the vehicle security and monitoring system acquire the real-time vehicle data and information according to the specification and the requirement by the vehicle owners.  The proposed technology required to mitigate the visibility and inaccurate monitoring of vehicles shall implement the combination of the technologies. The technologies to get incorporated in the system include the Radiofrequency Identification (RFID), the Global Positioning system (GPS), General Packet Radio Services (GPRS) and the application of the LANDMARK method (Zhang, et al… 2015). The improvement of the existing system shall incorporate the acquisition of a variety of complex environments that would satisfy the requirements specified by the vehicle owners. The proposed technology can provide high precise vehicle location. The proposed system also has the capability of the provision of the mechanical information about the vehicle status as well as the technology of the wireless data and information communication.
The LANDMARK approach technology provides the accurate vehicle location through the fixing of the longitudinal and latitudinal calculation depending on the physical and logical location of data and information. The LANDMARK technology guarantees the provision and the designation of the precise vehicle location. The technology provides data and information related to the software and the hardware components of the monitored vehicle. The implementation of the proposed system shall guarantee the integration of the intranet vehicle searching capability. The system shall enable the users of the system and the vehicle owners to search and track the location of the vehicles through the World Wide Web. The Telnet capability shall get enhanced through the implementation of the GPRS to indicate the vehicle location terminal as well as the integrating the internet technology and the Geographical Information System (GIS) technology.  The proposed system has the capability of incorporating the future extension of the user requirements thus increasing the scope and the usability of the system. The proposed system has modules for integrating the intelligent fleet management system for improving the public transportation and management system.       
Benefits of RFID Technology
1.    The benefits of the RFID are that the technology applies the use of the frequency thus the RFID does not require implementing the line of sight. The old technology applied the use of the barcode, the barcode technology suffer from the limitation of requiring the line of sight between the scanner and the barcode. The items get scanned must get close contact between the scanner and the object. The RFID technology applies to allow the communication between the monitoring center and the RFID devices to take place without direct contact.
2.    The RFID technology guarantee highly automated identification, reading and interpretation of data and information from the embedded tags. The RFID technology supports bulk recording of goods and services. The whole contents of the container can get scanned without necessarily scanning the items one by one. The RFID reduce the labor required for scanning the items in one roof.
3.    The RFID tags promote the transmission of the information from one area to another through improved transmission speed. The data and information relating a specific search occur within a short span of time. The searching of a particular vehicle has no influence on the location of the vehicle.  The RFID performs high-speed operations in transmitting data and information through the waves.
4.    The RFID technology offers huge storage location that stores big data and information in large volume. The type of data and information stored include the characteristics and features of the vehicle, the information regarding the model, make, manufacture, serial numbers and the batch number of the items.
5.    The RFID technology has a high level of flexibility and modularity. The data and information have the attributes of being written and rewritten on the RFID tags. The tags usually carry the most updated information regarding the location and the places where the particular vehicle gets located.  The data and information on the RFID tags get updated automatically as the vehicle moves. The RFID technology supports the real life application and records information using dynamic principles.
Disadvantages of DFID Technology
1.    The RFID technology has some limitations arising from the issues with reading and transmission of data and information. The network line transmitting data and information may have errors and problems thus affecting the data and information related to the monitoring center. The RFID technology gets affected by the simultaneous signals transmitted to same monitoring and controlling location. The data and information collision occur on the receiving end resulting in the inability of the tag responding to the simultaneous operations (Zhang, et al… 2014). The problems with motoring get rampant when the monitoring and controlling zone is under a third party. The signals relayed may conflict causing bottleneck and traffic on the transmitting line.


Planning
The system of vehicle tracking system shall have implementation through the application of four layer architecture to control and manage the location of the vehicle. The layers involved shall include the physical layer, the device layer, the data transmission layer and the application layer.
The Physical Layer:  The physical layer has the architecture composing of the passive tags. The vehicle mounted with the controller device send the electromagnetic signals in the form of the waves to the embedded tags. The tags get the information thus retrieving the location information from the updated tags. The RFID tags may have installation along the roads in a particular positioning that maximize the geographical coverage and the accuracy of the position.
The Device Layer: The device layer is the vehicle controller composed of the RFID module, the GPRS module, The GPS module and the sensing module. The device layer has responsibility for collecting the detailed information regarding the location of the vehicle. The collected information gets transmitted to the central controlling location. The device controller collects the information regarding the Identification information, the GPS position and the vehicle status, the storage, the transmission of the information to the monitoring and controlling center and transmission of data and information to the cloud by GPRS network (Zhang, et al… 2015).

Data transmission layer: The data transmission layer is responsible for transmitting data and information collected from the device layer by the GPRS network (Lehpamer, 2012). The transmission rate of the RFID is approximately 256 kbps.
Data Application Layer: The application data layer incorporates the data module and knowledge module.  The monitoring and controlling center make use of the center management module and the cloud platform to monitor, control and manage remote vehicles. The cloud acts as the repository center capable of storing analyzing and compiling information involving the vehicle position, the vehicle status, and the real-time circumstance.
Purchasing
The RFID require strong and dynamic systems for the complete implementation of the system. The following hardware and software requirement form the basic requirements for the implementation of the system.
1.    The RFID software with multiple numbers of items that get scanned within short time requires purchasing a processor with a speed of 6.56 Gigahertz per second (Mitrokotsa, et al… 2012).
2.    The RFID system requires purchasing of fully automated computer systems with accurate automation and compatible with the proposed technology.
Impact of Implementation
The RFID system shall require implementation through strictly following the policies and rules set by the International Standards for Organization (ISO). The individuals responsible for the utilization of the system shall require training on the issue regarding the bleaching of the data and information as well as training on policies governing personal privacy and confidentiality. The industry must conform to the rules and regulations as well as the standards set by the ISO.
Maintenance of the system
The RFID system is a rigid system with complex mechanical and physical framework that ensure that the entire hardware and software components have secure measures from direct damages. The RFID devices exist in sealed and protective coating that are usually water and dust proof. The RFID technology requires minimal extra operations on maintaining and protecting the system.
Conclusion
The vehicle industry is a dynamic industry focusing on the implementation and the maintenance of the value of customer assets and commodities. The security issue poses the major threat and attack within the vehicle industry. The solution to the security and monitoring problem is the application of the RFID system getting incorporated with the GPRS and the GPS to locate the vehicle accurately. The combination of the complex systems guarantees to locate the vehicle within any environment with its complexity. The proposed system is highly efficient and effective in the provision of searching and tracking of the vehicle even in the tunnels and the areas with long building structures. The RFID technology also provides a high level of intelligent platforms that facilitate the powerful information processing through the cloud computing as well as the analyzing vehicle hardware and software component devices. The RFID solution paradigms guarantee stability and reliability within the vehicle industry. 
References
Bolić, M., Simplot-Ryl, D., & Stojmenović, I. (2010). RFID systems: Research trends and
challenges. Chichester, West Sussex: Wiley
Lehpamer, H. (2012). RFID design principles
Mitrokotsa, A., Sheng, Q. Z., & Maamar, Z. (2012). User-driven RFID applications and
challenges. Personal and Ubiquitous Computing, 16, 3, 223-224
Rawal, A. (2009). RFID: The Next Generation Auto-ID Technology - A review of radio
frequency identification technology, including its successes and challenges. Microwave
Journal, 52, 3, 58.
Zhang, D., Huang, H., & Jo, M. (2015). Future RFID technology and applications: visions and
challenges. Telecommunication Systems : Modelling, Analysis, Design and
Management, 58, 3, 193-194
Zhang, D., Huang, H., & Jo, M. (2014). Future RFID technology and applications: visions and
challenges. Telecommunication Systems.


Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in custom essay research paper if you need a similar paper you can place your order from online research paper writer.

No comments:

Post a Comment

Buy thesis Online for Cheap

We are keen on ensuring that, any time students Buy thesis Online papers from our website, they get good grades that align with their expec...