Skip to main content

Evaluation and Exploration of Optimal Deployment for RFID Services in Smart Campus Framework

  • Conference paper
  • First Online:
Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 203))

Abstract

With the application of new technologies such as pervasive wireless computing and RFID, the theoretical foundation and technical support of smarter campus are evolved rapidly. Especially, the campus security in children surveillance has been regarded as a critical issue. This work establishes a smart campus framework based on innovative RFID services. The Tabu search strategy and optimal deployment mechanism are used to find the better locations of deploying readers. In order to keep the safety of campus, this framework analyzes and designs five innovative scenarios toward children surveillance, including campus gate management service (CGMS), student temperature anomaly management service (STAMS), hazardous area management service (HAMS), campus visitor management service (CVMS) and campus equipment management service (CEMS). Then, the pervasive RFID services of five scenarios are implemented in the campus according to the demand from parents’ and teachers’ point of view. The middleware of the proposed framework adapts to collect both active/inactive RFID tags deployed around the campus, processes and filters the necessary information and events generated by the RFID reader from different locations or user rules. Finally, this work is successfully deployed and currently in use by the National Taitung University Laboratory Elementary School with more than 150 students and 30 administration staffs and faculties. Compared to traditional dense mechanisms, this mechanism has a 36 % lower deployment cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. RFID Weblog. http://www.rfid-weblog.com

  2. Shepard, S.: RFID Radio frequency identification. McGraw-Hill, New York (2005)

    Google Scholar 

  3. Chen, H.Y.: Introduction to RFID systems—radio frequency identification system. Kings Information Corporation, Twain (2004)

    Google Scholar 

  4. Lee, R.K., Yu, C.H., Liang, M.S., Feng, M.W.: An approach to children surveillance with sensor-based signals using complex event processing. In: IEEE International Conference on e-Business Engineering, IEEE Press, Macau, China (2009)

    Google Scholar 

  5. Zangroniz, R., Pastor, J.M., Dios, J.J.D., Garcia-Escribano, J., Morenas, J., Garcia, A.: RFID-based traceability system for architectural concrete. In: 2010 European Workshop on Smart Objects: Systems, Technologies and Applications, Ciudad, Spain (2010)

    Google Scholar 

  6. Dimitriou, G. Antonis, Bletsas, Aggelos; Polycarpou, C. Anastasis, Sahalos and John N.C.: On efficient UHF RFID coverage inside a room. In: Fourth European Conference on Antennas and Propagation, Barcelona, Spain (2010)

    Google Scholar 

  7. Liu, C.L., Xie, Z.F Peng, P.: A discussion on the framework of smarter campus, In: Third International Symposium on Intelligent Information Technology Application, Nanchang, China (2009)

    Google Scholar 

  8. Chen, N.K., Chen, J.L., Lee, C.C.: Array-based reader anti-collision scheme for highly efficient RFID network applications. Wirel. Commun. Mobile Comput. 9, 976–987 (2009)

    Google Scholar 

  9. Kuo, C.H., Chen, H.G.: The critical issues about deploying RFID in healthcare industry by service perspective. In: IEEE Conference on System Sciences, Hawaii (2008)

    Google Scholar 

  10. Birari, S.M., Iyer, S.C.: Mitigating the reader collision problem in RFID networks with mobile readers. In: IEEE Conference on Networks, pp. 463–468, Malaysia (2005)

    Google Scholar 

  11. Glover, F.: Tabu search: a tutorial. Instit. Manag. Sci. 20(4), 74–94 (1990)

    Google Scholar 

  12. Chang, Y.C., Fong, C.J., Lin, Y.S., Chen, J.L., C.: Optimal deployment strategy of RFID networks using tabu search mechanism. In: 12th International Conference on Advanced Communication Technology, Korea (2010)

    Google Scholar 

  13. YesTurnkey Technology, Inc. http://www.yesturnkey.com

Download references

Acknowledgments

The author would like to thank Prof. Jiann-Liang Chen and Yu-Shan Lin, Mr. Ci-Jhih Fong and Miss Jing-Rong Wang for this work, especially the Ministry of Education under Contract No. 98TH01-AA8 and National Science Council of Taiwan under Contract No. NSC 100-2221-E-143-003 for financially supporting this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yao-Chung Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Chang, YC. (2012). Evaluation and Exploration of Optimal Deployment for RFID Services in Smart Campus Framework. In: Yeo, SS., Pan, Y., Lee, Y., Chang, H. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 203. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5699-1_50

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5699-1_50

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5698-4

  • Online ISBN: 978-94-007-5699-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics