Effective It Asset Management Using Surface Acoustic Wave Based Rfid
2316 Words10 Pages
1. FEASIBLE AND EFFECTIVE IT ASSET MANAGEMENT USING SURFACE ACOUSTIC WAVE-BASED RFID
Byung Youn Song & Rajit Gadh & Junghoon Lee & Jae Yeol Lee
An office consists of many devices which contain invaluable information and data for which there is no substitute. There are chances that the information is erased or damaged not merely by thieves or hackers, but by the employees themselves. If we are able to detect environmental conditions, severe damage caused by them can be prevented. The factors considered for testing are temperature sensing and acceleration sensing. SAW RFID tags use piezoelectric crystals with reflectors at pre-determined intervals to represent the tag 's data (which can be read by variations in amplitude, time, phase and/or other variables). When the incoming radio energy is transduced to a sound wave propagating along the surface of the tag, each location reflects back part of the signal. The spacing of these reflections (or echoes) indicates the location and relative position of each reflector. The central SAW reader checks ID and temperature of several SAW tags. When there is a missing ID, it calls the SAW readers which watch the doors till missing ID is found. If there is no signal inside the office or if there is a crossing signal through the doors, the RFID security system will send an alert to the central security centre.
2. AUTOMATED MANAGEMENT OF ASSETS BASED ON RFID TRIGGERED ALARM MESSAGES
Shengguang Meng, Dickson K. W. Chiu, Eleanna Kafeza, Liu Wenyin & Qing Li
RFID based Asset Management System (RAMS) is used to automate the management of assets that are to be controlled in real time. RFID readers submit the data of asset to RFID component via GSM modems when assets leave or enter base station. The...
... middle of paper ...
...s a standard for networked RFID systems. The trials were conducted at Tokyo in an exhibition of Internet technology and networking equipment. RFID systems were used for activities like same day registration processing, recording venue entry, necessary information processing (recording, searching). All the peripheral systems interacted through the network. RFID tags were used as an entry pass by the visitors and also as a business card to provide their contact information. The exhibitors used RFID tags to send electronic version of pamphlets to the visitors who had requested for information. Monitoring of visitors was done through real time monitoring system that made use of video surveillance. There was one problem faced i.e. when visitors carried laptop computers or other non-RFID electronic equipment, readability dropped and created difficulties in reading the tag.