Abstract
In supply chain management and asset tracking, identifying an item and its’ location is very important. RFID technology is suitable to perform the identification and tracking for better asset management. RFID tags can be embedded and attached to the items and their information can be classified for verification process. This is important to avoid problems such as data lost during data management as well as for time management. Multi-agent technology is useful to be implemented during the verification of RFID system architecture because intelligent agent has the capability to define specific verification process and can interact to each other in order to improve the efficiency of the RFID system. Multi-agent system, in this verification of RFID system architecture has a role in formulating the system taxonomy. Therefore, in this paper, the verification process of RFID system architecture has been discussed and successfully implemented in RFID shopping system. The implementation has been tested and evaluated. The results have been encouraging based on the investigation and verification done on a simulation platform.
Keywords
- Medium Access Control Protocol
- Enterprise Architecture
- Verification Process
- Open System Interconnection
- Concurrency Workbench
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Clampitt, H.G., Jones, E.C.: RFID Certification Textbook, 3rd edn., American RFID Solution (2007)
Weinstein, R.: RFID, A technical overview and its application to the enterprise. Proceedings of IEEE IT, 27–33 (2005)
Paper For Topic: Verification,validation, Certification. Obtain through the internet (accessed 12/6/2008), http://www.ece.cmu.edu/~koopman/des_s99/verification
Cui, J.F., Chae, H.S.: Agent-based Design of Load Balancing System for RFID Middlewares. In: Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS 2007 (2007)
He, H.: What is Service-Oriented Architecture (September 30, 2003), http://webservices.xml.com/pub/a/ws/2003/09/30/soa.html (accessed 12/4/2008)
Le, S., Huang, X., Sharma, D.: A Multi-agent Architecture for RFID Taxonomy. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part III. LNCS (LNAI), vol. 4694, pp. 917–925. Springer, Heidelberg (2007)
Foster, I., Jennings, N.R., Kesselman, C.: Brain Meets Brawn: Why Grid and Agents Need Each Other. In: Kudenko, D., Kazakov, D., Alonso, E. (eds.) AAMAS 2004. LNCS (LNAI), vol. 3394, pp. 19–23. Springer, Heidelberg (2005)
Pechoucek, M., Marik, V.: Industrial Deployment of Multi-Agent Technologies: Review and Selected Case Studies. To appear in: International Journal on Autonomous Agents and Multi-Agent Systems (2008)
Abdel-Naby, S., Giorgini, P.: Locating Agents in RFID Architectures, Technical Report #DIT-06-095 (DEC 2006), Department of Information and Communication Technology, University of Trento, Italy (2006), http://www.dit.unitn.it
Leong, K.S., Ng, M.L., Engels, D.: EPC Network Architecture, Auto-ID Center (2004), http://autoid.mit.edu/CS/files/12/download.aspx
Traub, K., Allgair, G., Barthel, H., Burstein, L., Garrett, J., Hogan, B., Rodrigues, B., Sarma, S., Schmidt, J., Schramek, C., Stewart, R., Suen, K.K.: The EPCglobal Architecture Framework (2005), http://autoid.mit.edu/CS/files/folders/5/download.aspx
Floerkemeier, C., Lampe, M.: RFID Middleware Design- Addressing Application Requirements And RFID Constraints. In: Proceedings of the, Joint Conference on Smart Objects and Ambient Intelligent: Innovative Context-aware Services: Usages and Technologies. Grenoble, France, pp. 219–224 (2005)
Microsoft Biztalk (2006), http://www.microsoft.com/biztalk/biztalk2006r2event.mspx (accessed 7/2/2008)
IBM, http://www.ibm.com/software/pervasive/ws_rfid_premises_server/ (accessed 31/3/2008)
Cisco, http://www.cisco.com/web/strategy/retail/RFID.html (accessed 15/10/2008)
Bea, http://www.bea.com/framework.jsp?CNT=index.htm&FP=/content/products/weblogic/rfid/ (accessed 31/8/2008)
Sybase, http://www.sybase.com/products/rfidsoftware (accessed 31/10/2008)
Sun, http://www.sun.com/software/solutions/rfid/index.xml (accessed 31/8//2008)
Concurrency Workbench of the New Century (CWB-NC), http://www.cs.sunysb.edu/~cwb/ (accessed 15/5//2009)
Passive Radio Frequency Identification (RFID)- A Premier for RF regulation by Kevin Powell, Senior Director, Product Development, Matrics Inc., http://www.rfidjournal.com/whitepapers/download/36 (accessed 15/5//2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Selamat, A., Lockman, M.T. (2009). Multi-agent Verification of RFID System. In: Nguyen, N.T., Katarzyniak, R.P., Janiak, A. (eds) New Challenges in Computational Collective Intelligence. Studies in Computational Intelligence, vol 244. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03958-4_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-03958-4_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03957-7
Online ISBN: 978-3-642-03958-4
eBook Packages: EngineeringEngineering (R0)