Implementation of radio frequency identification middleware with database

@article{Chen2017ImplementationOR,
  title={Implementation of radio frequency identification middleware with database},
  author={Bocheng Chen and Andy Mak and Fengqun Lin and Bo Yuan and Wenhuang Liu and Hongyang Wang},
  journal={Transactions of the Institute of Measurement and Control},
  year={2017},
  volume={39},
  pages={455 - 465}
}
This paper introduces the principle of a radio frequency identification (RFID) middleware, including its characteristics, problems and implementation in relation to Electronic Product Code (EPC). The targeted users are small and medium-sized domestic enterprises (SMEs), who need flexible and convenient solutions. This paper provides a framework and construction solutions of this simple RFID middleware, and discusses EPC concepts, solutions and advantages. It has been found that the best… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 27 REFERENCES
A SCADA oriented middleware for RFID technology
Composition and Implementation of RFID Lightweight Middleware
TLDR
In order to satisfy the practice management requirement of inland small and medium enterprises, this paper designs a lightweight Radio Frequency IDentification(RFID) middleware that implements lightweight middleware by integrating and filtering thought of database.
Managing RFID Sensors Networks with a General Purpose RFID Middleware
TLDR
This paper focuses on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware.
An Approach to Design and Implement RFID Middleware System over Cloud Computing
TLDR
This paper introduces an advanced RFID middleware management system (ARMMS) over Cloud computing, which provides equipment management, RFID tag information management, application level event (ALE) management, and Web service APIs and related functions.
RFID middleware design: addressing application requirements and RFID constraints
TLDR
It is argued that an RFID middleware should not only focus on the application needs, but must also consider the constraints imposed by passive RFID technology.
Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform
TLDR
This paper provides a privacy policy-driven model using some enhanced contextual concepts of the extended Role Based Access Control model, namely the purpose, the accuracy and the consent principles, and uses the provisional context to model security rules whose activation depends on the history of previously performed actions.
RFID enabled manufacturing: fundamentals, methodology and applications
Manufacturing enterprises and their associated production activities are becoming increasingly information intensive but the information systems used often rely on data which is assumed rather than
RFID-enabled traceability in the food supply chain
TLDR
The paper provides practitioners with insight on how RFID technology can meet traceability requirements and what technological approach is more appropriate.
Behavior-Based Cleaning for Unreliable RFID Data Sets
TLDR
This paper presents the design and development of a RFID data cleaning system, the first declarative, behavior-based unreliable RFIDs data smoothing system, and proposes a movement behavior detection model that takes advantage of kinematic characteristics of tags to assist in RF ID data cleaning.
Planetary-Scale RFID Services in an Age of Uberveillance
TLDR
The vision for a product service RFID system, what kinds of smart applications the authors are likely to see in the future as a result, and the importance of data management capabilities in planetary-scale systems are outlined.
...
...