Friday, December 6, 2019
Laundry Management Based on RFID-.com
Question: Using an Internet search explore an internet of thing project currently underway or already in place provide a detail account of the issue it respond to and outline its key features. Answer: Introduction The IoT that is described in this assessment is about Radio Frequency Identification Technology (Gan, Aw Sheng, 2016). RFID are used to track items and identify the items. In this modern world that includes technology to a great extend, RFID is an excellent technology for identification. The features of RFID are they are very fast in identifying many numbers of tags at a time and are has a capability of wireless reading from several meters. The latest IoT technology among all is the Identification with Radio Frequency technology (Gubbi et al., 2013). If an object is shown digitally, it is much easier to control the object from distant places with higher capability. A broad area of Automatic Identification System (Auto-ID) is the RFID system. The project that is chosen to explain RFID system in this assessment is laundry management. The RFID technology helps to improve the efficiency and effectiveness in managing the laundry and also simplify the operations (Patton et al., 2014). Tracking and maintaining a laundry manually is very difficult. To obtain a detail record of all the things, it requires a demanding labour to count record and separate the data and inserting them manually in the computer. Experienced laundry management is needed for productive laundry management and profitable cost. An Auto-ID RFID technology is useful for adding data to the stock systems (Li et al., 2014). The effort and time for shipping, receiving and shipping the laundry are managed by the RFID technology automatically (Chung, 2014). This provides accountability and control in laundry circulation process. In RFID, the status, last recorded time, information of the material, conditions of washing and number of washing cycles that are left are recorded in the system (Liao Hsiao, 2014). The basic components that are necessary in this practical application are tags and readers, the software of RFID technology, and all the design that is accumulately needed. Solution with features For overcoming process of laundry management RFID modular system is used. The processes that are used in managing the laundry are- Expedition from the laundry- Clothes are packed and selected accordingly ready to send to the destination and delivery is prepared. Move the clean items to the destination- Delivery of the items are done to the destination from where they were bought. Expedition in the destination- Expedition of clothes is done in the destination. Users- The clean clothes are kept in the proper place and the numbers of newly added clothes are recorded. Collection service- In collection service, the dirty clothes is again collected in the centralized point and after all the collections are completed, they are accumulately taken to the laundry again. Move the items back to laundry- The dirty items are collected and move to the laundry for washing, drying and ironing. Receiving of items- The items are collected and recorded the number of items that are to be cleaned and washed. Washing, drying and ironing- The items are finally washed, cleaned and ironed with proper care. If repair is needed then the repairmen is done Diagram depicting the methods of Laundry Management Fig: Process of Laundry Management Use Case Initialization of Laundry Management Fig: Use Case of Laundry Management Working Process The main goal of the project is to realize the SW module that is complex in acquiring the data from readers, providing data for evaluation, filtering, unifying or storing the data in the database by the use of a database server (Moatari-Kazerouni et al., 2017). For unifying and filtering purposes, IoT middleware controls process of reading to all the advance raw data and connected readers collected from an antenna that consists of information regarding the tags only in communication area of antenna and some of the readers also adds RSSI information to that. Data that are collected are processed, filtered, and analyzed for certaining direction of that passage (Chen, 2014). The information is shipped to a higher system in single report iteration. The lowest level of SW module is thecommunication layer that gives a different protocol of communication according to demanded protocols by different readers and from distinct manufacturers. Other rules of communication are added by the develo pers and this layer of communication is made universal. Mainly two protocols are implemented. First is the standardized Low Level Reader Protocol (LLRP) and then is the proprietary protocol that is defined for a particular manufacturer (Besore Beyerle, 2014). The LLRP supports a larger part of high standard RFID readers. This LLRP protocol gives a control to the air protocol and also arranges the control of the air protocol of RFID operating timing. Data are processed in LLRP from a single tag of RFID in EPC (Electronic Product Code) form and building of reader. Advantages and disadvantages of RFID based IoT The advantage of using the RFID technology is the way to use LLRP reader along with different manufactures and creates a tenderized interface (Rayes Salam, 2017). There are many disadvantages as well. The advantages are as follows- Detection of tag does not require human intervention. RFID tags have longer reading range. Adverse conditions cannot change the sensitivity of tag. The disadvantages are as follows- RFID systems are more expensive. RFID are difficult to understand. Tags that are used in RFID are much longer than the barcode labels. Conclusion This assessment sheds a light on the importance of IoT in this modern era. Based on IoT, details of RFID technology is described briefly. The RFID technology used in the project describes a laundry management. This paper illustrates the use of RFID technology to improve and simplify the operations if the laundry management. RFID reader is a wireless technology which makes the technology so much useful. RFID also lessens the cost of software. References Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions.Future generation computer systems,29(7), 1645-1660. Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L., Chen, H. (2014, September). Uninvited connections: a study of vulnerable devices on the internet of things (IoT). InIntelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint(pp. 232-235). IEEE. Li, Y., Nakasone, T., Ohta, K., Sakiyama, K. (2014, January). Privacy-mode switching: Toward flexible privacy protection for RFID tags in Internet of Things. InConsumer Communications and Networking Conference (CCNC), 2014 IEEE 11th(pp. 519-520). IEEE. Liao, Y. P., Hsiao, C. M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol.Ad Hoc Networks,18, 133-146. Chung, S. B. (2014). Clothing Management System Using the Smart Hanger Embedded RFID.Journal of the Institute of Electronics and Information Engineers,51(8), 185-194. Gan, O. P., Aw, L. L., Sheng, H. (2016, November). Reliable RFID bulk reading using adaptive time and power control. InRegion 10 Conference (TENCON), 2016 IEEE(pp. 130-134). IEEE. Besore, J. K., Beyerle, M. T. (2014).U.S. Patent No. 8,730,018. Washington, DC: U.S. Patent and Trademark Office. Rayes, A., Salam, S. (2017). The Things in IoT: Sensors and Actuators. InInternet of Things From Hype to Reality(pp. 57-77). Springer International Publishing. Moatari-Kazerouni, A., Moatari-Kazerouni, A., Bendavid, Y., Bendavid, Y. (2017). Improving logistics processes of surgical instruments: case of RFID technology.Business Process Management Journal,23(2), 448-466. Chen, C. C. (2014). RFID-based intelligent shopping environment: a comprehensive evaluation framework with neural computing approach.Neural Computing and Applications,25(7-8), 1685-1697.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.