Académique Documents
Professionnel Documents
Culture Documents
2012-13
1. INTRODUCTION
The first disturbing fact is that RFID is not a new technology. It was first used over sixty years ago by Britain to identify aircraft in World War II and was part of the refinement of radar. It was during the 1960s that RFID was first considered as a solution for the commercial world. The first commercial applications involving RFID followed during the 70s and 80s. These commercial applications were concerned with identifying some asset inside a single location. They were based on proprietary infrastructures. The third era of RFID started in 1998, when researchers at the Massachusetts Institute of Technology (MIT) Auto-ID Center began to research new ways to track and identify objects as they moved between physical locations. This research, which has a global outlook, centered on radio frequency technology and how information that is held on tags can be effectively scanned and shared with business partners in near real time. To do this we needed standards. The work of the Auto-ID Center focused on:
Reducing the cost of manufacturing RFID tags. Optimizing data networks for storing and delivering larger amounts of data. Developing open standards. It became apparent that the ideas being proposed, combined with other ongoing
technological and standardization activities worldwide, would help to reduce the costs of RFID tagging. By 2003, the Center had over 100 sponsors from four continents. Its final task was to conduct a large field trial with 40 participating companies in 10 US cities. Today, the work of the Auto-ID Center has helped to make RFID economically viable for pallet and carton-level tagging. The technology is also becoming more affordable for high-value items. The Auto-ID Center officially closed on October 26, 2003, transferring all its technology to EPCglobal.
EPCglobal is now leading the development of industry-driven standards for the Electronic Product Code (EPC) Network to support the use of Radio Frequency Identification (RFID) in today's fast-moving, information rich trading networks. EPCglobal is a memberdriven organization composed of leading firms and industries that are focused on creating
[Dept. of ECE, SCTIT] Page 1
2012-13
global standards for the EPCglobal Network. The EPCglobal Network is a set of technologies that enable immediate, automatic identification and sharing of information on items in the supply chain. In that way, the EPCglobal Network will make organizations more effective by enabling true visibility of information about items in the supply chain.
Figure 1: The History of RFID Radio Frequency Identification (RFID) technology is used in various industries for controlling and enhancing the data. One of these fields is vehicular applications ranging from safe navigation to Intelligent Transportation System (ITS). RFID can be used in vehicles and highways to control the access to the vehicles, traffic and parking management. Stored information in tags of cars, like as, serial number, driver information could be transferred to the reader. In dangerous region such as bridges, tunnels, and icy road, drivers might need more useful information about the surrounding environment to avoid an unpredictable accident. Output of this work is, creating an information service to supply necessary information to car in foggy and poor visibility road. In the following sections, first, the proposed architecture is described and experimental results are reported. After that, the accurate computing of car to road margin is described.
Page 2
2012-13
Weather-Related Crash Statistics Road Weather Conditions Foggy Annual Rates(Approximately) 15,600 persons injured 1% of crash injuries 2% of weatherrelated crash injuries 600 persons killed 1% of crash fatalities 8% of weatherrelated crash fatalities Table 2.1: Weather-Related Crash Statistics (Annual Averages) RFID is the emerging new technology which will help curd these accidents. A collision avoidance system in urban intersections can also be effectively supported by vehicle RFID readers and lane RFID tags. A driver entering the 4-way intersection may not have noticed a vehicle executing a left turn. In poor visibility (e.g., foggy night), this can easily lead to an accident. If vehicles are aware of their accurate position from tags deployed near the intersection and have announced their position via a beacon, the accident can be
[Dept. of ECE, SCTIT] Page 3
Percentages
2012-13
avoided. Another promising application of passive lane tags is a wrong way warning. There are many one-way streets in downtown areas. It is important to warn drivers before a head on collision occurs. Particularly deadly is the freeway or ramps. It is unfortunately very common for drivers at night to enter the freeway or the ramp and drive on the wrong way in the fast lane with consequences that are easy to imagine. As the car reads the lane RFIDs, it immediately realizes that they are coming in the wrong sequence, that is, it is going the wrong way! Advance wrong way warning will prevent the driver from entering the freeway. Moreover if a vehicle notices a wrong way from RFID tag data after entry, it can automatically broadcast an alarm messages to neighbor vehicles to alert them of the possible collision danger.
Page 4
2012-13
3. RFID BASICS
Radio Frequency Identification (RFID) is a set of technologies that allow for short range, contact-less reading of information from a low cost, compact, data source. An RFID system will include data-carrying transponders, known as tags and devices to access the data on the tags; a reader or reader/writer.
Tag or TransponderAn RFID tag is a tiny radio device that is also referred to
as a transponder, smart tag, smart label, or radio barcode. The tag comprises a simple silicon microchip (typically less than half a millimeter in size) attached to a small flat aerial and mounted on a substrate. The whole device can then be encapsulated in different materials (such as plastic) dependent upon its intended usage. The finished tag can be attached to an object, typically an item, box, or pallet, and read remotely to ascertain its identity, position, or state. For an active tag there will also be a battery.
Page 5
2012-13
Host Computerthe data acquired by the readers is then passed to a host computer, which may run specialist RFID software or middleware to filter the data and route it to the correct application, to be processed into useful information.
Figure 3c: Basic Operations of RFID (RFID Center: Dr Carol David Daniel, Introduction to RFID, RFID Forum December 2004, RFID Center)
Page 6
2012-13
2012-13
not have noticed a vehicle executing a left turn. In poor visibility (e.g., foggy night), this can easily lead to an accident. If vehicles are aware of their accurate position from tags deployed near the intersection and have announced their position via a beacon, the accident can be avoided. Another promising application of passive lane tags is a wrong way warning. There are many one-way streets in downtown areas. It is important to warn drivers before a head on collision occurs. Particularly deadly are the freeways or ramps. It is unfortunately very common for drivers at night to enter the freeway or ramp and drive on the wrong way in the fast lane with consequences that are easy to imagine. As the car reads the lane RFIDs, it immediately realizes that they are coming in the wrong sequence, that is, it is going the wrong way! Advance wrong way warning will prevent the driver from entering the freeway. Moreover if a vehicle notices a wrong way from RFID tag data after entry, it can automatically broadcast an alarm messages to neighbor vehicles to alert them of the possible collision danger. A passive RFID system is composed of a passive RFID tag storing data and an RFID reader that accesses the tag and collects data. The RFID reader continuously emits RF radio waves and waits for signals back from the tag. When the tag receives the radio waves, it absorbs energy from the waves, modulates ID data, and sends information back to the reader. This section reviews properties of an RFID system that are closely related to RFID communication. The necessity of external power classifies the RFID system; an active RFID tag contains a power module, whereas a passive tag is powered by a radio wave beamed from a reader. An operating frequency determines how energy and data is transmitted; through an inductive coupling or a backscattering coupling. The inductive coupling uses an inductor coil in HF and LF communication. The antenna coil in the reader generates a magnetic field in a nearby area which gives rise to inductive power in the tag antenna. Current in the tag is so weak, creating a very short transmission range, i.e. around several centimeters. The modulated backscattering coupling in UHF bandwidth makes use of the fact that a microwave is rejected by an object whose size is greater than half of the wave length. This enables longer radio range, i.e. approximately up to 10m. An RFID system suffers from two types of collision, namely a reader and tag collision. The reader collision occurs when more than two RFID readers try to access one RFID tag simultaneously. With Time Division Multiple Access (TDMA), a reader is able to
[Dept. of ECE, SCTIT] Page 8
2012-13
transmit a wave only within the assigned slot. Concurrent transmission of tag data toward a single RFID reader causes the tag collision. TDMA has also provides an anti-collision algorithm in two approaches; ALOHA-based and binary tree-based. In a pure ALOHA algorithm, a tag, after receiving a wave, waits for a randomly generated time period before sending data back. Frame slotted ALOHA (FSA) divides a frame into a fixed number of slots. Here, one frame is a time period when a reader waits for receiving data back from tags after sending a wave out. The wave contains information on the number of slots, S, in one frame. A tag, when receiving the wave, arbitrarily picks up a random number less than S and transmits data only during the selected slot period. If two different tags pick the same slot by chance, a collision occurs. Then, they try to transmit data again in the next frame. The binary tree-based algorithm allows a reader to send a command to a tag. When a collision occurs, the reader selects a number by looking at tag IDs causing the collision and sends the number to tags. Then, tags whose ID is greater than the number are allowed to send data back to the reader. The rest tags transmit data in the next round. This paper studies feasibility of a commercial RFID system in vehicular environment because of its cost benefit. When exploiting the on-board RFID reader system, i.e. the second scenario. The first constraint is vehicles' high speed; can an RFID reader access an RFID tag while driving fast? In a freeway, vehicles usually drive at faster than 100km/h. This is different from the ATC case because vehicles get slower for safety when passing through the toll gateway. In the new system, a vehicle should be allowed to obtain tag data without decreasing its speed. Therefore, it is fundamental to examine that an RFID communication can occur in fast moving situation. Chon et al. studied this issue by dropping RFID tags down in front of a fixed RFID reader in a laboratory. They estimated that an RFID communication can occur at the maximum speed of 165km/h. However, real world data is completely different from the laboratory results and we investigate it in the later section. Another constraint comes from a very short communication distance. Unlike the ATC case, i.e. 3m~4m, the communication distance between a reader and a tag could decrease to less than 30cm since a reader on the front bumper of a vehicle is very close to tags on the road surface. When considering cone-shaped wave propagation, the short distance creates a small radio area, reducing probability of successful RFID communication. In addition, the communication area moves fast along with the on-board reader, which also increase
[Dept. of ECE, SCTIT] Page 9
2012-13
uncertainty of communication. In order to enhance RFID read performance, this paper considers tag multiplicity and antenna diversity.
Erratic mobility of the on-board reader also makes the RFID communication unstable. In the case that a reader is fixed on a roadside, it can be easily calibrated. This concept is important because the reader plays an active role in RFID communication. Therefore, maximizing the RFID read performance can be achieved. However, a reader in motion is highly likely to access tag data in an arbitrary way. This means that RFID communication could fail at some unpredictable points. For this reason, initial arrangement of RFID systems is to be inspected carefully to minimize performance degradation. In this paper, we explore strategy of how to install an RFID system on a vehicle and a roadside.
2012-13
one tag) and tag intervals could be also taken into account when deploying the tags. The RFID tags would not be distributed over all the roads, but we believe that a number of tags under an appropriate strategy can be deployed in some specific roads where accidents frequently occur. For example, when we consider 'lane level navigation' guiding a freeway exit to a driver in this paper, the tags can be placed only near the exit. Based on assumption of regional deployment scenario, this study examines 2m and 5m tag intervals in a 3kmlength test road for evaluation. If we can assume that each vehicle is equipped with a GPS device, the number of tags to be deployed is reduced dramatically. In fact, the deployment strategy, e.g. deciding the tag numbers, is one of the biggest issues in the vehicular RFID applications since each application demands different specification.
2012-13
2012-13
Table 4.3: Moving speed of RFID read area (time to pass over a RFID tag with h = 37:5cm and = 45).
RFID Communication An RFID communication is a process where an RFID reader transmits wave to an RFID tag and then receives data back from the tag. In order to obtain RFID data, one communication, at least, must occur between the reader and the tag in the read area. Because the reader antenna is attached to a vehicle traveling at a high speed, the read area also travels and encounters the fixed tags during a short time period. One communication should occur at least once within this time period. We define RFID read latency as a time period when one communication occurs and thus a reader successfully obtains RFID data from a tag. The read latency is upper-bounded by vehicles' speed. In Table 4.3, we compute how fast the read area moves from Equation 1. For comparison, the third column, i.e. measured [sec], shows results from our experiments. The gap between 'computed' and 'measured' values is due to the reduced length (x2) of the RFID read area in a real situation, which is around 1minstead of 1.85m. The table also indicates that the read latency should be less than 36ms at the speed of 100km/h. Data Rate 256kbps of data rate of the RFID tag means that it takes 0.22ms to transmit 64bit tag data. Our experiment, however, reveals that the average read latency is 38.89ms. This slow communication mainly results from the pause time at the selected tag whose maximum value is 62.5ms. This implies that there might be no RFID communication when a vehicle travels at
Page 13
2012-13
a higher speed than 60km/h since the moving speed of the read area becomes 60ms or shorter (Table 4.3). Memory and Packet The tag chip contains 64bit data memory. The most significant 2 bits are reserved, the next 8 bits identify a company producing the tag, and the rest 54 bits including a CRC code represent the RFID tag ID. The tag initiates a packet containing all memory data. Memory size can increase up to 2,048 bits if the memory is user-programmable. Therefore, advanced data manipulation can be achieved.
Page 14
2012-13
techniques are experimentally investigated to satisfy the performance, which would overcome the limitation of the commodity RFID system for better RFID performance. It may be possible to select another RFID system providing shorter maximum pause time for the performance issue. Unfortunately, however, the selected tag was the one having the shortest maximum random access time available on the market at the moment of experiments. A non-zero maximum access time of an RFID tag is fixed at the factory. Having a long random access time in a commercial RFID tag is to avoid tag collision, which is the most significant issue in existing RFID application. Recent researches have tried to advance specification of RFID systems including the pause time in a tag for various applications. We expect that further interdisciplinary researches enable an experiment with very short random access times.
Page 15
2012-13
Figure 5: Test bed: RFID system This section discusses installation of the RFID system in a vehicular environment. At first, we adjust the reader antenna to be mounted on a vehicle. Then, we examine an RFID tag; in particular, tag multiplicity is taken into account for performance improvement. When mounting a reader antenna on a vehicle, we deliberate its horizontal and vertical position. We affix the antenna at the center of the front bumper since this position shows the minimum error rate. With respect to the vertical position, we set h=30cm, because our experiment indicates that20~40cm of height shows similar performance and the height of the front bumper of the test vehicle is 30cm. RFID tags are placed at the center of each lane and on the road surface. We build a static test set for laboratory experiments .The reader antenna is fixed on a 30cm-heightframe and tags are aligned near the antenna on the floor. The reader, connected to the antenna via the cable but not shown in this figure, identifies the tags accessed within 18ms, which helps determine the read area with different pitch angles of the antenna. The read latency to access the tags 0.5m away from the antenna is measured. The figure represents one of the experiment settings that evaluate the yaw angle of a tag. The antenna is adjusted to have 30 of pitch angle, and the tag, inside the black square line, has 30 of yaw angle.
Page 16
2012-13
When one reader antenna is mounted, the read area is 86cm in width, which is acceptable if a user drives in the middle of a lane all the time. Otherwise, the read area may not pass over the tags, which will make worse the RFID read rate as drawn in Figure 5.2b. When mounting an additional reader antenna, the width is extended to 130cm with small
[Dept. of ECE, SCTIT] Page 17
2012-13
decrease of the length from 80cm to 78cm. In this case, a vehicle is able to obtain RFID data unless it changes a lane. Experiments in this paper use dual RFID reader antennas, otherwise explicitly stated.
Figure 5.2a: Length of RFID read area with varying pitch angles of RFID reader antennas.
Figure 5.2b: Average read latency with varying pitch angles of RFID reader antennas. A pitch angle of the reader antenna is as much important as horizontal and vertical position because the beam shape and direction influences substantially on the receive sensitivity in a short-ranged RFID communication. Definition of the pitch angle is referred from Section 4.3. The experiment measures the average read latency by varying the pitch
[Dept. of ECE, SCTIT] Page 18
2012-13
angle from 0 to 70 as shown in Figure 5.2b. In some specific range of distance, 0cm~30cm on the x-axis, the average read latency in most test cases converges to around 13ms. As the distance point becomes further from the range area (to forward or backward direction), the average read latency increases dramatically. As the x-axis can be considered as the length of the read area, the figure also illustrates how the length changes with different pitch angles. Figure 5.2a sketches the side view of the read area where one communication occurs at least once within 18ms based on results from Figure 5.2b. It tells that 20~40 of the pitch angles creates the longest read area within an error tolerance and out performs other angles. In our experiment, we attach the reader antenna on the front bumper with 30 of the pitch angle for easiness of installation.
Figure 5.2d: Average read latency with varying pitch angles of RFID tag (yaw angle=0degand pitch angle of the reader antenna=30deg).
Table 5.2: Average read latency [ms] with varying yaw angle (a single RFID tag, a single RFID reader antenna, and pitch angle = 0). This subsection investigates a posture of an RFID tag in terms of its yaw angle and pitch angle. Figure 5.2c describes their definition. A yaw angle is an internal angle of the tag and the straight line drawn from the antenna to the tag.
[Dept. of ECE, SCTIT] Page 19
2012-13
The average read latency when varying the yaw angle by every 30 is summarized in Table 5.2. At 60, 90, and 120 of yaw angles, there is no communication. Given that the used reader antenna is horizontal polarization, the results are reasonable since energy transmission is maximized with matched polarization between the reader antenna and the tag. The rest settings of yaw angles show similar results, and thus we use 0 of yaw angle. Definition of the pitch angle of a tag is same to that of the reader antenna as shown in Figure 5.2c. If we can use Cat's Eye' when deploying RFID tags on roads, each tag can have 0~20 of pitch angles. For each pitch angle, we measure the average read latency and the length of the read area, which is shown in Figure 5.2d. Results in the case of 10 and 20 are almost same. When comparing them to the result of 0, the only distinction is the starting and ending point of the read area. Therefore, we can conclude that the pitch angle of a tag does not affect performance of the RFID read rate. For deployment of the RFID system, we use 0 of pitch angle.
Figure 5.3b: Average read latency with four RFID tag cluster models
Page 20
2012-13
We consider four types of RFID tag clusters as shown in Figure 5.3a a tag consists of a tag chip (a black spot at the center) and a dipole antenna. Each cluster manifests its own characteristic in a way how to combine multiple tags in one cluster. Cluster 1 and 2 represent horizontal and vertical integration, respectively. In the next, a space is given between two neighboring member tags, which is expected to enhance the receive sensitivity. In Cluster 4, the tag chips share one dipole antenna. We randomly place each cluster within the target read distance (0.5m) and compute an average read latency after iterating the experiment. Figure 5.3b shows the average read latency with four RFID tag cluster models with increasing the number of the tags from 1 to 5. At first, it verifies that as a cluster includes more tags the read latency comes to be shorter. In Cluster 2, 3, and 4, the time values go down below 18ms when there are 2, 3, and 4 members tags. With 5 member tags, performance gets much worse due to tag collision. Based on results, we decide to use Cluster 3 having 3 or 4 members of RFID tags since they show the best performance.
Page 21
2012-13
Page 22
2012-13
Figure 6a: Data part of tag format for proposed design Data can be grouped in 6 categories now. The data situation and content and fields are added up in table -6. Where a, b, c, d, e and f are binary numbers.
Table 6: Information that is stored in Data part of tag As an example, suppose that there is a tunnel in front of car. The tags near the tunnel have codes as Figure 6b.
Figure 6b: Content of tags when there is a tunnel in road If there are other object in road, like as left-turn or 4-way cross, the fields B, C or D have a binary number too.
[Dept. of ECE, SCTIT] Page 23
2012-13
Figure 6.1: Pictures on monitoring displayer based on appearance of change in road. a) Nothing in front b) 3-way in front c) turn left in front d) 4-way in front e) turn right in front f) tunnel in front g) bridge in front h) bridge in front i) bridge& turn right in front
[Dept. of ECE, SCTIT] Page 24
2012-13
A. Power Based If tags are installed on x meters from the road center, we can detect the power level of incoming signal from tags and have a criteria of distance of car from tag (or road margin). The incoming power curve from tags and the reader distance from tag are shown in Figure 6.2a. Based on this distance, we can activate proper alarms like as green-light in 4, red light in 3, blink in 2 and buzzer in 1 meter.
B. Time Based We can compute the accurate distance between car and tag or road margin. If we want to have this information, we must use two tag readers in car, one in front and other in the
Page 25
2012-13
back of car. When the reader detects the RFID tag data, it is transmitted to the monitoring system. According to Figure 6.2b, we can compute as follows:
t1: data receiving time for tag-reader1 t2: data receiving time for tag-reader2 Vc: signal propagation speed
Figure 6.2b: Detection of accurate distance between car and tag The t2, t1, Vc and B are known, so by solving the equations, D is known and then:
A. Two Sided-Road When road is two sided and meanwhile the road width is low, information of one side tags could be read by another side cars. This cause to read nonrelated data by readers and the
Page 26
2012-13
road monitoring cannot be used by user. To overcome this problem, another field is added to stored data for showing the direct of tags. This field is numbered in ascending, 1 in the start of road, with increment by one for next tag. So Figure 6b will be changed to Figure 6.3 form. Order of Tag-no would be checked by server and if matched by previous ascending order, will be accept, else will be discarded.
Figure 6.3: Content of tags when there is a tunnel in road and with tag-no. B. Snow and Rain Effect Snow and rain reduce the read distance of tags. Snow can effect intensively on reducing this distance, if it is accumulated on tag. To overcome this problem, we can use tags with high distance readability. Tags used in the experiment have 7 meter read distance (XCTF-8102A), but we have to use tags with more read distance. For snow accumulation problem, we must mount tag on a shady place.
Page 27
2012-13
7. RFID Vs GPS
RFID
As you might imagine, this technology is best suited for smaller spaces, where the infrastructure is already in place to use it. RFID requires specialized scanners to read and transmit data, and without one specific to the proprietary receivers, there's no point. The dedicated infrastructure may be of great cost on a large scale, but on a small, localized scale, may be incredibly powerful for both tracking and for providing information. That being said, they work brilliantly for hundreds of purposes in your everyday lives, from automatically scanning highway toll fees to using Zip cars to use of public transportation to preventing shop lifting to IDing livestock to even identifying humans by passportor implant. RFIDs serve for an incredible variety of purposes, and the number is just likely to grow.
GPS
Now, GPS is a very different beast from RFID. While it also uses radio waves to transmit data, it does so using, well, the global positioning system of 24 satellites, as opposed to specialized scanners here on the ground. Radio waves sent out from this system of satellites transmit their time and orbital data to receivers down on Earth. Using the data from multiple satellites, receivers can then triangulate their position relative to the satellites, and thus on the Earth's surface. GPS, thus, is best suited for tracking anywhere in the worldbut because of the sheer distance of the satellites, the signal is weaker, and is easier to jam, or even just not get a signal. Civilian models particularly are not as accurate in certain situations as one might like, for instance at the bottom of a canyon or indoors. Emergency homing beacons, car trackers or navigational devices tend to be the most well known civilian uses, which don't require accuracy within a few inches, but happen on a large scale where no other infrastructure such as RFID or radio towers are set up. GPS is, by definition, global, and so the sort of tracking its best at happens on the scales of tens or hundreds of miles.
[Dept. of ECE, SCTIT] Page 28
2012-13
2. Return on Investment (ROI): RFID costs more to implement than a barcode system, but provides a good return on investment in the long run, since RFID is significantly more efficient.
3. Less Vulnerable to Damage: RFID tags are less susceptible to damage. An RFID tag is securely placed within an object or embedded in plastic, enabling the system to be used in a variety of harsh environments, such as areas of high temperature or moisture, or with exposure to chemicals or the outdoors.
Demerits
1. Expense: RFID systems are typically more expensive than alternatives such as barcode systems. While passive tag reading is similar to (and generally less expensive than) barcode reading, active tags are costly due to their complexity. Active tags consist of an antenna, radio transceiver and microchip, increasing the overall cost of an RFID system. 2. Collision: Tag collision and reader collision are common problems with RFID. Tag collision occurs when numerous tags are present in a confined area. The RFID tag reader energizes multiple tags simultaneously, all of which reflect their signals back to the reader. This result in tag collision, and the RFID reader fails to differentiate between incoming data. RFID reader collision results when the coverage area
[Dept. of ECE, SCTIT] Page 29
2012-13
managed by one RFID reader overlaps with the coverage area of another reader. This causes signal interference and multiple reads of the same tag. 3. Security: RFID technology gives rise to numerous security concerns. Since the system is not limited to line-of-sight, external (and malicious) high-intensity directional antennas could be used to scan sensitive tags. Fraud is always a possibility when the technology is used for high-security operations, such as payment verification.
Page 30
2012-13
Page 31
2012-13
REFERENCES
[1] Al-Khateeb, K.A.S., Johari, J.A.Y. and Al-Khateeb, W.F., 2008. Dynamic Traffic Light Sequence Algorithm Using RFID, Journal of Computer Science 4 (7), pp. 517-524., DOI: 01.3844/jcssp.517.524 [2] Cook, Robert, 2006. An RFID Information e-Highway, Computer science colloquium, Hong Kong, 19-22 June 2006, Department of Computer Science City University.
[3] Garza, J.M., and Fedrowitz, W., 2008. "Implementation of RFID Technology in the VTVDOT Highway Maintenance Monitoring Program (HMMP)," Proceedings of the Intelligent Computing in Engineering Conference, Plymouth, United Kingdom, July 2008, pp. 518-527 [4] Hwang, K., Kim, K. and Eom, D., 2006. DiCa: Distributed Tag Access with Collision avoidance Among Mobile RFID Readers, IFIP International Federation for Information Processing 2006, pp. 413422. [5] Lee, Eun-Kyu, Yoo, Young Min, Park and Chan Gook, 2009. Installation and Evaluation of RFID Readers on Moving Vehicles, VANET09, September 25, 2009, Beijing, China, 2009 [6] Ok, Min-hwan,2009 A Location Tracking by RFID to Assist the Transportation Vulnerable in Subway Stations, Mathematical Methods and Applied Computing, WSEAS Press, pp. 704-706. www.wseas.us [7] Yoo, J., Kim, B., Jung, Ho., Park, C. and Ko, Y., 2008. INTRACS: Intelligent Traffic control System Based on Ubiquitous Technology, INFOS2008, March 27-29, 2008 CairoEgypt, pp. 78-83
[8] Zebra_tech, 2011. An Introduction to Passive RFID, RFID Journal, white paper, January 2011, pages12, www.rfidjournal.com
[Dept. of ECE, SCTIT] Page 32