23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Radio Frequency Identification 8-23<br />

8.31 trace-and-Track<br />

Fully convinced of the potential gains offered by the RFID, a smart R&D system has been installed<br />

in Walmart for more efficient inventory control and better market intelligence. Since line-of-sight<br />

is not required for tag detection, misplaced pallets and cartons could be found via a network of stationary<br />

interrogators and supplemented by handheld readers. Significant saving could be achieved<br />

by locating an overstocked item in one warehouse for replenishing the understocked condition in<br />

another store. In conjunction with terrestrial and satellite <strong>communication</strong>s links, an accurate real-time<br />

trace-and-track of merchandise throughout the world could be conducted for upcoming promotional<br />

activities.<br />

Recall that information obtained from the manufacturer is more than a simple confirmation, the<br />

reverse is also valid. Dependent on the object class of a tag, the IP address of the reader and the ID<br />

number of the operator could be sent to the manufacturer with the TID. Together with the date and the<br />

time of transaction, these ID numbers could be stored in the database of the given tag. This proposal is<br />

welcome in China where careless contamination and deliberate poisoning in processed food is a major<br />

issue of concern. Based on the information provided by the manufacturer, the origin of error could be<br />

located and cleared. Moreover, as the handlers’ identities in all nodes of the logistics chain have been<br />

recorded, the person responsible for the error could be identified. The ability to trace is a powerful<br />

tool in deterring a frustrated employee or any other person from committing this type of criminal act.<br />

Finally, but not the least, it must be emphasized that this apparently tedious dual-authentication process<br />

is costless because sending a 1-bit confirmation takes as much time as sending it with other ID numbers<br />

because the overheads needed to set up a <strong>communication</strong> channel involves the sending of thousands of<br />

bits to and fro between both ends of the link.<br />

8.32 Innovative Applications<br />

Through examples cited in the previous headings, the intrinsic characteristics of the UHF RFID have<br />

been demonstrated. Its potentials have also been explored via some propositions. Probably due to the<br />

bar code mentality, developments of RFID technologies have outpaced conceptions of ingeniously new<br />

RFID applications, not to mention system deployments.<br />

Although the RFID is treated as a wireless bar code in Walmart’s inventory system, substantial values<br />

have been added to justify the finite cost of RFID tags. Certainly, deployment of an RFID inventory system<br />

in a hazardous environment is justified. For the closely packed tanks of inflammable gas in an open<br />

space or a warehouse, a real-time check of tags via a network of interrogators on lamp posts or mounted<br />

on the ceiling is definitely preferred to the close up reading of vicinity cards one-by-one by an operator<br />

using a handheld device. The extra expenditure is justified in some high-profile events, such as the New<br />

York Marathon and the Tour de France where thousands of participants must be counted in no time.<br />

Due to role reversal, the RFID system could also be used to detect cheating, an invaluable value added.<br />

As previously mentioned, HF RFID <strong>systems</strong> are vulnerable for replacement. One of the likely casualties<br />

is the inventory system for libraries. The principal reason for this change is the adoption of the UHF<br />

RFID by the logistics industry. It is foreseen that every new book will have a UHF RFID tag embedded<br />

in an invisible location before shipment; therefore, significant manpower could be saved from attaching<br />

an HF RFID tag (Figure 8.14) on a new book manually, the most time-consuming and expensive process<br />

in the deployment of a smart library system. Besides the multibook self-service check out and the<br />

multibook easy-return <strong>systems</strong> (Figure 8.15), library utilization could be enhanced through the smart<br />

book sorting machine (Figure 8.16) and the smart bookshelves equipped with multiple antennas for a<br />

real-time inventory check. For example, the library of the City University of Hong Kong was originally<br />

designed for 10,000 students, but it now serves more than 20,000 students with more than a million<br />

volumes. Hence, one half of the books are stored off campus. For access to these books, a student has<br />

to browse through the Web and order it as if it were an interlibrary loan. Usually, the book will be<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!