Multimedia Tools and Applications

, Volume 76, Issue 4, pp 5985–6002 | Cite as

RFID-based scale model freight car system allowing realtime quantity checking

Article
  • 217 Downloads

Abstract

The barcode system currently used in the market has a weakness in that identification is only made when the barcode is visible. Unlike the barcode system, the RFID system uses radio frequency technology, allowing more accurate and faster identification of objects than the barcode system. RFID is a method to identify object data using radio frequency technology by attaching a tag to identification objects to be monitored. Active research has been conducted recently, and a lot of attempts have been made to introduce RFID technology in logistics and manufacturing sectors. This paper presents a method to check the accurate number of articles loaded in the freight car using RFID technology. The present research concerns the method in which the RFID reader and middleware is used to accurately and quickly count the number of RFID-tagged articles in real-time. When the tagged articles arrive at the reader area, the information read by the reader is delivered to the middleware. Then, the middleware identifies the number of tags, displaying the results to the user.

Keywords

Freight car Logistics RFID reader Middleware Video scale model 

References

  1. 1.
    Abawajy J, Fernando H (2015) Policy-based SQLIA detection and prevention approach for RFID systems. Comput Stand Interfaces 38:64–71CrossRefGoogle Scholar
  2. 2.
    Adhikari R (2014) A meticulous study of various medium access control protocols for wireless sensor networks. J Netw Comput Appl 41:488–504CrossRefGoogle Scholar
  3. 3.
    Bahri S, Ibrahim A (2013) RFID in libraries: a case study on implementation. Libr Hi Tech News 30(5):21–26CrossRefGoogle Scholar
  4. 4.
    Bo Y, Zhu XN, Wang DW (2013) Construction of railway-waterway intermodal transportation network with crunode-line combination based on path rationalization model. Adv Mater Res 336–338:2516–2520Google Scholar
  5. 5.
    Cheng H, Tan J, Liu Y, Ni WC (2012) An intelligent RFID data predicting method based on BP-adaboost. Information Science and Service Science and Data Mining (ISSDM), 2012 6th International Conference on New Trends in, pp. 628–632Google Scholar
  6. 6.
    Fafoutis X, Di Mauro A, Vithanage MD, Dragoni N (2015) Receiver-initiated medium access control protocols for wireless sensor networks. Comput Netw 76:55–74CrossRefGoogle Scholar
  7. 7.
    Gnanaraj JW, Ezra K, Elijah (2013) Smart card based time efficient authentication scheme for global grid computing. Hum-Centric Comput Inf Sci 3:16CrossRefGoogle Scholar
  8. 8.
    Habiba U, Imdadulm M, Amin MR (2014) Performance evaluation of the VoIP service of the cognitive radio system, based on DTMC. J Inf Process Syst 10(1):119–131CrossRefGoogle Scholar
  9. 9.
    Huang C-F, Lee W-T (2013) Radio channel analysis for a RFID system employing a leaky coaxial cable as a reader end. Antennas and Propagation (EuCAP), 2013 7th European Conference on, pp. 2580–2583Google Scholar
  10. 10.
    Mejjaouli S, Babiceanu RF (2015) RFID-wireless sensor networks integration: decision models and optimization of logistics systems operations. J Manuf Syst 35:234–245CrossRefGoogle Scholar
  11. 11.
    Merja J, Shah S (2013) Simplified secure wireless railway for public transport. Computational Intelligence, Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on, pp. 77–82Google Scholar
  12. 12.
    Mitropoulou CC, Lagaros ND, Papadrakakis M (2015) Generation of artificial accelerograms for efficient life-cycle cost analysis of structures. Eng Struct 88:138–153CrossRefGoogle Scholar
  13. 13.
    Najera P, Lopez J, Roman R (2011) Real-time location and inpatient care systems based on passive RFID. J Netw Comput Appl 34(3):980–989CrossRefGoogle Scholar
  14. 14.
    Novak M, Chloupek A, Ankerl G (2013) Railreader-“MT” multi-RFID-system supports high availability and safety in railway networks. ICTIS 2013:1900–1906Google Scholar
  15. 15.
    Pérez-Sanagustín M, Ramirez-Gonzalez G, Hernández-Leo D, Muñoz-Organero M (2012) Patricia Santos, Josep Blat, Carlos Delgado Kloos, discovering the campus together: a mobile and computer-based learning experience. J Netw Comput Appl 35(1):176–188CrossRefGoogle Scholar
  16. 16.
    Reddy YT, Angadi S (2013) Digital eye for coach guidance and automation using RFID technology. Int J Eng Trends Technol 4(4):938–941Google Scholar
  17. 17.
    Shao C, Leng S, Zhang Y, Huirong F (2014) A multi-priority supported medium access control in vehicular Ad Hoc networks. Comput Commun 39:11–21CrossRefGoogle Scholar
  18. 18.
    Shiau YJ, Chiu YB (2013) Design and implementation of long range active RFID technology. Adv Mater Res 779–780:1715–1718CrossRefGoogle Scholar
  19. 19.
    Snyder RM (2013) RFID tags and NFC(Near Field Communication) technologies, including security and privacy implications. 2013 ASCUE Proceedings, pp. 90–98Google Scholar
  20. 20.
    Vo CC, Chilamkurti N, Loke SW, Torabi T (2011) Radio-Mama: An RFID based business process framework for asset management. J Netw Comput Appl 34(3):990–997CrossRefGoogle Scholar
  21. 21.
    Vukovic M, Das R, Kumara S (2013) From sensing to controlling: the state of the art in ubiquitous crowdsourcing. Int J Commun Netw Distrib Syst 11:11–25CrossRefGoogle Scholar
  22. 22.
    Xiang Jun S, Guo GQ (2012) Alnic measuring system for rail type vehicles. Appl Mech Mater 241–244:2023–2027Google Scholar
  23. 23.
    Yao ZM, Liu XO, Liu W (2013) RFID technology-based the railway package management platform design. Adv Mater Res 774–776:1653–1656CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.Department of Computer Science & EngeneeringDongguk UniversitySeoulSouth Korea
  2. 2.Department of Electrical & Electric EngineeringDaewon UniversityChungbukSouth Korea
  3. 3.Department of Humanitas CollegeKyung Hee UniversitySeoulSouth Korea

Personalised recommendations