IWRT 2010 Abstracts


Full Papers
Paper Nr: 4
Title:

X-CleLo: Intelligent Deterministic RFID Data Transformer

Authors:

Peter Darcy, Bela Stantic and Abdul Sattar

Abstract: Recently, passive Radio Frequency Identification (RFID) systems has received an exponential amount of attention as researchers have worked tirelessly to implement a stable and reliable system. Unfortunately, despite vast improvements in the quality of RFID technology, a significant amount of erroneous data is still captured in the system. Currently, the problems associated with RFID have been addressed by cleaning algorithms to enhance the data quality. In this paper, we present X-CleLo, a means to intelligently clean and enhance the dirty data using Clausal Defeasible Logic. The extensive experimental study we have conducted has shown that the X-CleLo method has several advantages against a currently utilised cleaning technique and achieves a higher cleaning rate.
Download

Paper Nr: 7
Title:

RFID Event Data Processing -- An Architecture for Storing and Searching

Authors:

Matthieu-P. Schapranow, Jürgen Müller, Alexander Zeier and Hasso Plattner

Abstract: The pharmaceutical industry suffers from increasing counterfeit rates. Federal law restrictions force manufacturers to guarantee authenticity of their products. RFID technology can be used as foundation for an integer and counterfeit-resistant pharmaceutical supply chain. In the given paper, we introduce an architecture optimized for storing and searching of RFID data. It is specifically designed for the needs of the pharmaceutical industry such as tracking and tracing of pharmaceutical products. We share our benchmark results measured with our implemented main-memory-based architecture prototype.
Download

Paper Nr: 9
Title:

Maximization of the Operating Volume using HF RFID Loop Antennas

Authors:

Kevin D'hoe, Lieven De Strycker, Nobby Stevens, Bart Nauwelaers and Jean-Pierre Goemaere

Abstract: This article describes how a passive radio frequency identification (RFID) system is optimized. Our attention focuses on the operating volume of a circular loop antenna. Hereby the design of loop antennas is given a new approach to establish a maximum operating volume. Therefore, the off-axis magnetic field is investigated. This is done for a circular loop in free space and in the vicinity of a metal plane. A numerical approach is given towards the maximization of the operating volume. The goal is to provide new insights into the design of a loop antenna and enhance the reliability of the RFID system.
Download

Paper Nr: 10
Title:

Towards the Internet of Things: An introduction to RFID technology

Authors:

Miguel Pardal and José A. Marques

Abstract: Radio frequency identification (RFID) is an automatic identification technology making its way to supply chains in Retail, Pharmaceutical, and other industries. RFID extends the reach of supply chain information systems in such a way that it will soon be possible and economically feasible to tag valuable physical objects and then to track and trace them, enabling many novel and useful applications. This paper provides an introduction to RFID for practitioners with a computer science background.
Download

Paper Nr: 11
Title:

Experiments of Discovery Services Interconnection

Authors:

Le M. Jérôme, Ivan Bedini, Madelaine Jacques and Adrien Laurence

Abstract: This paper presents a platform called IOTA, an open implementation of the EPCglobal architecture. It aims to collect and to store events about object involving in a given supply chain. Iota uses a Petri net simulator to emulate the lower layers including the RFID readers. Iota focuses on the design of a non centralized Discovery Services and experiments in a real network environment. This paper presents the experiments of a solution for distributed Discovery Services and its impact on the overall architecture in terms of performance issues.
Download

Paper Nr: 13
Title:

RFID-assisted product delivery in sustainable supply chains: a knowledge-based approach

Authors:

Michele Ruta, Floriano Scioscia, Eugenio Di Sciascio, Filippo Gramegna, Saverio Ieva and Giuseppe Loseto

Abstract: The paper proposes an integrated framework which uses knowledge representation theory and languages to annotate relevant product information in a semantically rich and unambiguous fashion so disclosing several added-value services in multiple supply chain stages, without depending on a back-end infrastructure. EPCglobal RFID protocol standard has been extended and further applied in an innovative supply chain model where production, packaging and logistics have a reduced ecological impact. Particularly, on-product information are leveraged in a more general Intelligent Transport System (ITS) framework enabling advanced delivery scheduling and product tracking.
Download

Paper Nr: 16
Title:

CSMA Multi-Stage Anti-collision Protocol for Active RFID systems

Authors:

Alejandro Palomo-López, María V. Bueno Delgado, Alejandro Palomo-Lopez and Javier Vales-Alonso

Abstract: Current anti-collision protocols for active RFID systems stem from the ISO-18000-7 standard, which selects Frame Slotted Aloha as the underlying Medium Access Control protocol. However, these approaches neglect the possibility of using the Listen-Before-Talk mechanism already available in active RFID tags. In this work, a Carrier Sense Multiple Access mechanism with Multi-Stage, (CSMA/MS), derived from the quasi-optimal Sift distribution, is developed in order to substitute the anti-collision procedure in active tags. The key of CSMA/MS is to concatenate various contention windows, where only winners contend in the next contention windows. We demonstrate that this approach nearly achieves a 100% of identification probability per slot, improving Sift results and outperforming standard procedure.
Download

Short Papers
Paper Nr: 2
Title:

RFID USES FOR PROSIS AMBIENT CONTROL

Authors:

Patrick PUJO, Fouzia OUNNAR and Yves Dubromelle

Abstract: Product traceability is now an obligation in terms of observability and flexibility of manufacturing systems and logistics chains. RFID technologies are due to be more and more integrated into existing communication networks. New infotronics technologies will enlarge the capabilities to interact, to react and to customise control systems with innovative possibilities. New control approaches should be proposed based on the use of emerging technologies that would allow their operability in manufacturing sites. A model for ambient control production systems is proposed, based on a set of holonic entities interacting through set of entities that offer ambient service. After describing the PROSIS model, some of the ambient services that can be provided and the way these services could be delivered are presented.
Download

Paper Nr: 3
Title:

INTEGRATING RFID AND SECURITY DEVICES FOR AN INNOVATIVE SYSTEM TO MANAGE CLASSIFIED DOCUMENTS

Authors:

Elena Stringa, Claudio Bergonzi and Graziano Azzalin

Abstract: This paper presents an innovative RFID solution to manage archives of sensitive documents. The goal of the system is to provide a tool for: i) automatically tracing all document accesses at level of single pages (who read the document, when, how many copies have been produced, etc.); ii) knowing at any time where a document has been archived; iii) providing periodical archive inventory; and iv) signalling to competent authorities any anomaly detected in the archive (e.g. missing document or part of document, unauthorized document access attempt, etc.). A system achieving the mentioned goals represents an important component for national/European/international security, as it allows quickly recovering important documents in case of critical or emergency situations. Moreover, with the proposed system the institution in charge of sensitive document archives can demonstrate the proper and secure management of the entrusted material. The solution we propose is based on the integration of standard access control and security devices, and advanced RFID technology. This paper describes in details how the system has been implemented and reports tests performed in laboratory by simulating different scenarios, showing that the proposed solution is suitable for a reliable management of sensitive document archives.
Download

Paper Nr: 8
Title:

Fast and Simple Anti-collision Protocol Based on Up-Down Counter and One Bit Reader Response

Authors:

Usama Sayed and Mostafa Salah

Abstract: This paper describes a simple fast protocol of counter based anti-collision approaches. The tag processing is depending on one depth counter and conflict pointer to determine its position from the identification state. The main advantage of the proposed protocol is the simple one bit reader response in the identification process. The one bit reader response will provide the tags all information about the new state of the current depth position of replying. The tags will transmit its replying order without reader interruption until the reader detects the collision state or the identification state. Based on this idea, the identification process will be faster than the traditional counter based anti collision protocols and the overhead information will be reduced. Performed computer simulations have shown that the collision recovery scheme is very fast and simple. The simulation results shows that the proposed technique outperforms most of the recent techniques in most cases.
Download

Paper Nr: 12
Title:

EPC Virtual Lab: Experiments using an RFID location simulator

Authors:

Carlos Perdigão, Carlos Perdigão and Miguel Pardal

Abstract: Radio frequency identification (RFID) is an automatic data capture technology that has great potential to improve business. However, RFID projects have significant up-front costs: buying tags and readers, and installing them in business locations. Until now, a physical deployment was required to properly test RFID software and its integration with existing systems. This paper describes EPC Virtual Laboratory (EPC VLab), a physical world simulation engine, that can be used to feed standard RFID information systems with realistic data. The simulator has proved to be useful for preliminary and exploratory testing.
Download

Paper Nr: 15
Title:

RFID-enabled Supply Chain Process Redesign using simulation

Authors:

Angeliki Karagiannaki and Katerina Pramatari

Abstract: Abstract. Empowered by the possibility to automatically identify unique product instances, the emerging Radio Frequency Identification (RFID) technology is expected to revolutionize the supply chain processes. However, in view of the numerous possible ways that RFID can be implemented within the processes, the issue of supporting the process redesign based on a credible assessment between the current (as-is) and the future (to-be) processes has become a matter of considerable concern and debate for both practitioners and academics alike. To design RFID implementations in the supply chain using a robust dynamic anal-ysis, we resort to discrete event simulation. As a result, based on a simulation study, the two factors of object identification level and RFID labeling responsi-bility are identified as key decision factors to design the RFID-enabled processes.
Download