All communication between system modules is
made through XML messages and all system
graphical interfaces are web-based, allowing its
access from any computer without needing specific
application installation, just a conventional web
browser. The integration of the managing
application with the company's corporative systems
is made through recorded text files containing the
XML messages in a shared directory due limitations
of the company legacy system.
5 CONCLUSIONS
Despite the difficulties installing a wireless network
and an optical fiber network in old warehouses, and
placing sensible radio frequency equipment exposed
to weather hazards, it was possible to install
successfully all equipment and do their calibration.
The server applications behaved correctly when
were placed an amount of 200 trucks simultaneously
circulating around the area and unloading the cargo.
Some unexpected problems happened and they
were solved. The switch installed inside the padlock
tag changed the inductance of the 433MHz antenna,
so the internal organization of the tag was changed
to keep the antennas as far as possible from the
switch. Sometimes the truck parks in front of the
reader, generating many readings of the tag, but
sometimes the readings happed before the truck left
the place. For this reason, filtering controls were
implemented inside the DMS to avoid generation of
fake alarms.
The system helped the company management
and security. With the additional information
generated by the system for the logistic department
about the weight, unload time statistics, and the
number of trucks in real time in each stage of the
unloading process, it was possible to optimize the
trucks' line, reducing the wait in line and therefore,
reducing the average time of the unload process
from 50 minutes to 30 minutes. The installation of
RFID padlock tags in the trucks reduced in 60% the
load theft in the port area and allowed the security
team to find out points of vulnerability of the
previous system and to detect the majority of the
truck drivers corrupted by the theft group.
This same system showed flexible enough to be
used with other RFID technology and applications,
like passive tags to control automated manufacture
lines, supply chain pallets and forklifts. In this case
the application will control if the item pass through
all the phases in manufactory line, from the
beginning until the expedition. Can control who was
the forklift operator and how long he took to move
the products from one place to other. So the product
will be tracked, supplying information about the
storing and movement time, and the forklifts will be
tracked as well, supplying information about the
efficiency of the forklift operator and generating
alarms if he does something wrong.
REFERENCES
Almanza-Ojeda, D. L.; Hernandez-Gutierrez, A.; Ibarra-
Manzano, M. A.; 2006. Design and implementation of
a vehicular access control using RFID. In Electronics
and Photonics, 2006. MEP 2006. Multiconference on
2006, pp. 223 – 225.
Balanis, C. A.; 1997. Antenna Theory: Analysis and
Design. John Wiley & Sons, USA, second edition, pp.
86-88.
Blythe, P.; 1999. RFID for road tolling, road-use pricing
and vehicle access control. In RFID Technology (Ref.
No. 1999/123), IEE Colloquium on 25 Oct. 1999, pp.
8/1 – 816.
Chen, S.; Gulati, S.; Hamid, S.; Huang, X.; Luo, L.;
Morisseau-Leroy, N.; Powell, M. D.; Zhan, C.; Zhang,
C; 2003. A three-tier System Architecture Design and
Development for Hurricane Occurrence Simulation. In
Information Technology: Research and Education,
2003. Proceedings International Conference, pp. 113
– 117, 11-13 Aug. 2003.
Foster, P.R.; Burberry, R.A.; 1999. Antenna problems in
RFID systems. In RFID Technology (Ref. No.
1999/123), IEE Colloquium on 25 Oct. 1999, pp. 3/1 - 3/5.
Foina, A. G.; Barbin, S. E.; Ramirez Fernandez, F. J.;
2007. A New Approach for Vehicle Access Control
using Active RFID Tags. In IMOC - International
Microwave and Optoelectronics Conference, 2007.
Proceedings of the 2007 IMOC.
Kim, T.; Kim, H.; 2006. Access Control for Middleware in
RFID Systems. In Advanced Communication
Technology, 2006. ICACT 2006. The 8th International
Conference Vol. 2, 20-22 Feb. 2006, pp. 1020 – 1022.
Ni, L. M.; Liu, Y.; Lau, Y. C.; 2003. LANDMARC:
Indoor Location Sensing Using Active RFID. In IEEE
International Conference in Pervasive Computing and
Communications, 2003, pp. 407-415.
Raza, N.; Bradshaw, V.; Hague, M.; 1999. Applications of
RFID technology. In IEE Colloquium on, 25 October,
1999, pp. 1/1 - 1/5.
Tuttle, J.R.; 1997. Traditional and emerging technologies
and applications in the radio frequency identification
industry. In Radio Frequency Integrated Circuits
(RFIC) Symposium on, 8-11 Jun. 1997, pp. 5 – 8.
Zhao, J.; Zhang, Y.; Ye, M.; 2006. Research on the
Received Signal Strength Indication Location
Algorithm for RFID System. In Communications and
Information Technologies, 2006. ISCIT '06.
International Symposium on Oct. 2006, pp. 881 – 885.
HUNTER – HYBRID UNIFIED TRACKING ENVIRONMENT - Real-time Identification and Tracking System using
RFID Technology
325