You are on page 1of 29

SEMINAR REPORT

BY

UGWU KINGSLEY KENECHUKWU

2017030182415

TOPIC

A STUDY OF RADIO FREQUENCY IDENTIFICATIONS

SUBMITTED TO

COMPUTER SCIENCE DEPARTMENT

FACULTY OF APPLIED NATURAL SCIENCES (FANS)

ENUGU STATE UNIVERSITY OF SCIENCE AND TECHNOLOGY (ESUT).

IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF


BACHELOR OF SCIENCE (B.Sc) HONOUR DEGREE (COMPUTER SCIENCE).

2021
APPROVAL

This Seminar has been approved for the Department of Computer Science, Faculty of
Applied Natural Sciences, Enugu State University of Science and Technology, by:

……………………………………… ……………………………..
SEMINAR SUPERVISOR Date
MRS UGWU EDITH
(Signature)

………………………………………… ………………………….....
HEAD OF DEPARTMENT Date
ENGR. DR. ASOGWA T.C
(Signature)

I
CERTIFICATION

This is to certify that the Seminar entitled “A STUDY ON RADIO FREQUENCY


IDENTIFICATION” by UGWU KINGSLEY KENECHUKWU with matriculation
number 2017030182415 in the Department of Computer Science, Faculty of Applied
Natural Sciences. This is in partial fulfillment of the requirements of Bachelor Degree
Computer Science under Enugu State University of Science and Technology, Agbani,
Enugu.

……………………………………… ……………………………..
SEMINAR SUPERVISOR Date
MRS UGWU EDITH
(Signature)

II
DEDICATION

I dedicate this seminar report to God Almighty my creator, my strong pillar, my source of
inspiration, wisdom, knowledge and understanding. He has been the source of my
strength throughout this program and on His wings only have I soared. I also dedicate this
seminar report to my lovely parents Mr & Mrs UGWU who have always been there for
me I love you both.

III
ACKNOWLEDGEMENT
My deepest gratitude goes to God who has provided all that was needed to complete this
project and the program for which it was undertaken for. There was never lack or want.
Throughout this entire study, He took care of everything that would have stopped me in
my tracks and strengthened me even through my most difficult times.
I appreciate the Vice Chancellor Professor Charles Eze who has shown exemplary
leadership of Leader and Father. I cannot forget Registrar, Barrister T.M Ikpenwa, my
fellow eagle and a true mentor for young leaders. I appreciate the Dean of the Faculty of
Natural Applied Sciences, the chaplaincy and all other Principal Officers. Thank you for
playing your part in ensuring that the vision speaks in my life. My appreciation also goes
to the Head of Department of Computer Science, Engr Dr Asogwa T.C, a truly kind man.
I sincere appreciation also goes to my supervisor, Mrs Ugwu Edith whose contribution
and constructive criticism has pushed me to expend the kind of efforts I have exerted to
make this work as original as it can be. Thanks to him I have experienced true research
and my knowledge on the subject matter has been broadened. I will never forget you sir.
My utmost regard also goes to my parents, Mr and Mrs Ugwu who painstakingly laid the
foundation for my education giving it all it takes.

IV
ABSTRACT
RFID (Radio Frequency Identification Technology) is a field of computerizing
recognition process that is progressively gaining thrust in recent years and is now being
seen as a means of enhancing data handling procedures, complimentary in many ways to
other data capture technologies such as bar coding.
A variety of devices and associated systems have been developed to satisfy a broad series
of applications. Regardless of the diversity of applications, the ideologies upon which
they are based are quite understated, even though the technology and technicalities
associated with their function can be quite innovative. Just as one need not know the
workings of a mobile phone or personal computer to use these items; it is not obligatory
to know the technicalities to identify with the principles, considerations, and potential for
using RFID in a practical sense. This piece however focuses on the security aspects of the
technology and various possible applications apart from regular inventory management.

V
TABLE OF CONTENT Page

Cover page

Dedication

Certification

Abstract

Table of contents

Acknowledgement

SECTION I

1.0 Introduction 1

1.1 Statement of the problem

1.2 Objectives of the seminar

1.3 Significance of the seminar

1.4 Scope of the seminar

1.5 Constraints and Limitation

1.6 Report Organization

1.7 Definition of Terms

SECTION II

2.0 Literature Review:

SECTION III

3.0 Radio Frequency Identification:


3.1 RFID Components:
3.2 Operating Principle

VI
3.3 RFID Applications

SECTION IV

4.0 Conclusion:

References

VII
AKNOWLEDGEMENT

I wish to express my profound gratitude to God almighty for his grace, protection, which were
sufficient for me throughout my industrial training program, I thank my parents also for their
financial and moral support towards the completion of this project.
I also want to appreciate my supervisor Mrs Ugwu Edith for his immerse contribution towards
this Seminar research work.

8
SECTION I

1.0 INTRODUCTION
Radio Frequency Identification (RFID) technologies provide a wireless means of communication
between objects and readers. RFID involves the use of tags, or transponders, that collect data and
manage it in a portable, changeable database. A similar technique known as bar code represents a
sequence of lines (usually vertical) and number used to store object information such as identity,
date of manufacture, price etc., which can be revealed by an optical scanner. RFID, on the other
hand, has the ability to identify and track products and equipment in real-time without contact or
line-of-sight and the tags can withstand harsh, rugged environments.
RFID is a flexible technology that is convenient, easy to use, and is well suited for automatic
operations. It combines advantages not available with other identification technologies such as
bar codes. RFID can be supplied as read-only or read/write, does not require contact or line-of-
sight to operate, can function under a variety of environmental conditions, and provides a high
level of data integrity. In addition, because the technology is difficult to counterfeit, RFID
provides a high level of security.
RFID is used as a direct replacement for barcode technology. The advantages it offers include
100% read accuracy, the ability to survive demanding environments, and the elimination of line-
of-sight requirements. The term RFID simply describes the use of radio frequency signals to
provide automatic identification of items.

Figure 1: Configuration of RFID System.

9
RFID (Radio Frequency Identification) is an automatic identification method. The great appeal
of RFID technology allows storing and reading the data without requiring either contact or a line
of sight between the tag and reader. RFID consists of three basic component such as transponder
(tag), interrogator (reader) and antenna. In a typical communication sequence, RFID system
performs a number of functionalities between reader and tag. RFID reader emits a continuous RF
carrier sine wave. When a tag enters the RF field of the reader, the tag receives energy from the
field. Further, receiving sufficient energy, it begins to modulate the carrier signal to the data
storage on the tag. The modulating carrier signal is resonated from the tag to the reader. The
reader detects the modulating signal from the tag, and decodes signal in order to retrieve the data
from the tag. However, the information relays to the host computer where more manipulation
data will be stored and finally will be displayed to the user. RFID is basically based on wireless
communication making use of radio waves, which is a part of the electromagnetic spectrum [36].

1.1 STATEMENT OF THE PROBLEM

In this section, an attempt was made to give reasons why the use of RFID is better than the Bar
Code System for Libraries and book storage and identification. This piece however focuses on
the security aspects of the technology and various possible applications apart from regular
inventory management.

OBJECTIVES OF THE SEMINAR

The following are the seminar objectives:

i. To help understand the Radio Frequency identification technologies


ii. To help individuals and institutions know how to use the radio frequency signals to
provide automatic identification of items.
SIGNIFICANCE OF THE STUDY
a) To help tracking in tracking of assets and managing inventory.
b) To study and discuss RFID advantages and automation processes
c) To evaluates the challenges facing RFID deployment in stores across Nigeria.

10
1.4 SCOPE OF THE SEMINAR

This seminar will be focused on studying Radio frequency identification and its application to
the automation of our everyday work that can make it easier.

1.5 LIMITATION OF THE STUDY

The major limitations that may hinder realization of the seminar set goals within the stipulated
time frame might be issues concerning finances. The cost of accessing internet materials,
printing hardcopies of downloaded materials, making photocopies, are important issues that must
be handled financially. There is also problem associated with unstable power supply and
decreased voltage when supplied.

1.6 SEMINAR REPORT ORGANIZATION

This seminar is organized into four sections.

Section one is brief overview of each section is presented below. Section one introduces the
topic. The problem statement is explained in general terms. A summary of research objectives
and the scope of the seminar are also presented.

Section two discussed the relevant literature review of the study, with the discussion on past
research works on Radio Frequency Identification.

Section three outlines the methodology employed where details of steps to be taken to model the
system design and the section four concludes the seminar

1.7 DEFINITION OF TERMS

Barcode: A printed horizontal strip of vertical lines of varying widths used to identify an item.
Barcodes work in conjunction with a scanner, using line-of-sight technology.
Antennas: Used by RFID technology on tags and readers. The tag antenna is the conductive
element that enables the tag to send and receive data. The reader antenna is used to emit radio
waves in order to communicate with the RFID tag.

11
Electronic product code (EPC): Created as a potential replacement for the barcode. The EPC
identification system was designed to enable identification of individual items containing RFID
tags, whereas barcodes simply identify the manufacturer and class of products. The EPC
identifies manufacturer, category of product, and the specific item.
Closed system: Refers to an implementation of RFID technology in which RFID
data are only accessible to those within the confines of that system.
Active tag: An RFID tag that carries a transmitter capable of sending back information to an
RFID reader, instead of relying upon reflecting the signal back from the reader, as is done with
passive RFID tags. The majority of active tags use batteries for powering the transmitter.

12
SECTION II

2.0 LITERATURE REVIEW:


RFID is a new technology which can drastically transform manufacturing and SCM sector, but
its adoption rate is still low [6]. Hence, researchers have focused on identifying the critical
factors specific to the manufacturing sector influencing RFID adoption. Chang et al. [21] and Lin
L.C. [22] conducted an empirical study to assess the key factors influencing RFID adoption in
Taiwanese logistics industry. Reyes et al. [13] also conducted similar research for logistics
industry across the globe. Wang et al. (2010) surveyed to discuss potential barriers to adopt
RFID in Taiwanese manufacturing firms. Chuang and Shaw [2] surveyed to identify critical
factors influencing RFID implementation and other enterprise resource management systems.
Bose and Lam [1] discussed the barriers for management of massive amount of data generated
by RFID technologies and suggested various solutions for the successful RFID implementation.
Inventory management is a part of the warehousing process. In inventory management, the
company can keep track of raw materials, Work-in-process goods and finished goods. Inventory
management can only be helpful to check the availability of the exact physical number of stocks
present in the warehouse, whereas warehousing involves all the movements from inward
movement of raw materials to outbound movement of finished products. Lim et al. [6] conducted
a literature review of articles published between year1995 to 2010 related to RFID and its impact
on warehousing operations and presented its applications, benefits and obstacles to RFID
adoption in warehousing. Huang et al. [15] presented an advanced manufacturing technology
namely RFID based wireless manufacturing to manage job shop work-in-process inventories and
for improving shop floor efficiency.
Logistics management deals with meeting customer demands by planning and controlling the
movement of goods from suppliers to consumer and information from end-user to suppliers
whereas Supply chain management is a broader term which involves all the activities from
procurement of raw materials till finished goods delivered to end customer. Logistics
management is a part of supply chain management. Logistics management focuses on
maximising customer satisfaction while supply chain management seeks to achieve overall
competitive advantage. Many researchers have worked on application of RFID in supply chain
management. Sarac et al. [17] conducted a literature review by focusing on impact of RFID
technology on reducing the cost and business value of RFID for supply chain management. They
13
have also presented return on investment analysis for deployment of RFID in supply chain
management. Musa and Dabo [5] also conducted an exhaustive literature review of 1187 articles
published between years 2000 to 2015 on RFID in SCM and provided useful insights for future
researchers.
Zelbst et al. [4] studied how RFID implementation has positive effect on operational
performance within the manufacturing sector. Zelbst et al. [34] also evaluated the effect of RFID
and information sharing on supply chain performance. Zelbst et al. [35] further assessed the
effects of RFID technology adoption and information sharing within a manufacturing facility on
the just-in-time (JIT) and total quality management (TQM) practices and its subsequent impact
on operational performance of manufacturing firms. Lee et al. [10] investigated the impact of
RFID on inventory performance of a supply chain through simulation modelling of a
representative manufacturer–retailer supply chain. Kumar and Chan [20] have utilised RFID
technology to improve inventory and warehouse operations at reverse facilities in closed-loop
logistics. Johansson and Palsson [11] performed an empirical study in Swedish manufacturing
firms to conclude that better logistics performance can be achieved using RFID technology.

SECTION III

14
3.0 RADIO FREQUENCY IDENTIFICATION:
Radio Frequency Identification (RFID) is a generic term for technologies that use radio waves
to automatically identify people or objects from a distance of several inches to hundreds of feet.
This is an Automatic identification (Auto-ID) technology [37] by which any object can be
identified automatically. Barcode, Magnetic Strip, IC card, Optic Character Recognition (OCR),
Voice Recognition, Fingerprint and Optical Strip etc are also identification technologies. RFID
technology use automatic data capture system which helps in increasing system efficiency.
Combination of tag and reader is used for identification purpose. A code is stored in RFID tag
and this tag is attached to a physical object. Now object becomes unique identifiable. Then
object transmit code from tag. In this way reader get information about object.RFID is not
actually a new technology, but it is applied in new ways [46]. RFID is rapidly growing
technology. RFID offers much advantage over traditional identification device like barcode. To
read the barcode, the barcode scanner needs to be in line of sight with the label.
It means that the manual movement of the objects or scanner is necessary. RFID, on the other
hand can read data from tag without line of sight. Also, no alignment is necessary in RFID
technology. Singh et al. [45] provides a brief overview of the RFID technology.
RFID has high reading speed and this can work in presence of barrier. This technology is more
effective when longer read range, fast scanning and flexible data carrying capability is required.
RFID system has received more and more attention in many areas like manufacturing companies,
agriculture, transportation and industries etc.

3.1 RFID COMPONENTS:


A combination of RFID technology and computing technology is called RFID system as shown
in figure 2. A RFID system consists of following components:
1. Tag/Transponder (electronic label).
2. Antenna (medium for tag reading).
3. Reader /Interrogator (read tag information).
4. Communication infrastructure (enable reader/RFID to work through IT infrastructure).
5. Application software (user database/application/ interface).

15
Figure 2: Basic RFID systems.
Transponder (Tags)
An RFID tag is a small electronic device that is also referred to as a transponder. The tag
consists of a simple silicon microchip [47] and antenna. The tag can be attached to an object,
typically an item, box. Information is collected by chip and can be transmitted wirelessly. RFID
tag can be active (with batteries), passive (without batteries) and semi-passive (hybrid). Tag has
an identification code that can be transmitted towards reader.
RFID Antenna
RFID antennas are used to collect information about any item. There are many types of RFID
antenna like patch antennas, linear polarized antennas, stick antennas and adaptive antennas, gate
antenna and Omni directional antennas. RFID antenna types are shown in figure 2.

Figure 3: RFID antenna types


According to the researchers, an RFID antenna should satisfy following requirement [47]:
(i) Its size should be small, (ii) should have omnidirectional or hemispherical coverage, (iii) must
provide maximum possible signal to the microchip, (iv) be robust and (v) be very cheap.

16
Antenna designer firstly make a known antenna and then change its physical parameters to
obtain optimum bandwidth.
In last few years, researchers have looked into the designing of circular polarized antennas.
Dual polarized antenna can be used. This antenna is suitable for passive 5.8 GHz in RFID
applications. Inverted F antenna has been used in many RFID applications due to its small size
and its ability to change its polarization characteristics. For ultra high frequency (1GHZ),
meander line antennas (MLA) are used for reducing size of antenna Marrocco et al. (2002) first
introduced the design of miniaturized meander line antennas for RFID applications. Micro-strip
antennas are used for RFID. These has attractive features such as lightweight, small volume, low
profile and low production cost.
RFID Reader
Third component of RFID system is RFID reader. The reader sometimes called an interrogator
or scanner sends and receives RF data to and from the tag via antennas. A reader may have
multiple antennas that are responsible for sending and receiving radio waves. Reader informs
data processing system about presence of tagged item. It consists of three main parts: control
section, high frequency interface and antenna. Read range of reader is affected by number of
factors. Antenna gain, frequency used, orientation of antenna will effect read range. Reader
comes in four types: Read, Read/write, fixed and mobile [38].
Operating Frequencies
Different types of RFID systems operate at different radio frequency as given in table 3. Each
radio frequency has its own read distance, power requirements and performance. The choice of
frequency depends on the application. Mostly four types of frequencies are used in RFID
technology:
A. Low frequency (120-140 KHz) - Low frequency RFID tags operate in low frequency range.
Low frequency tags are used for depositing and withdraw and controlling following with the
assets.
B. High frequency (13.56 MHz) - High frequency RFID tags operate in high frequency range.
HF tags are useful for asset-tracking applications, contact-less credit cards and ID badges.
C. The ultra-high frequency (869 MHz-928 MHz)-UHF RFID tag operate in 869 MHz -
928MHz.UHF tags are used in supply chain management applications.UHF tags offers the longer
reading range and are cheaper to manufacture in bulk.

17
D. Microwave (2.4 GHz-2.5 GHz) - Microwave system offers higher read rate. Microwave tags
are expensive than UHF tags. Microwave tags are used in electronic toll applications.

Table 1: RFID operating frequency


3.2 OPERATING PRINCIPLE
Passive tag does not have its own power source. Chip in this tag get power from reader. Reader
antenna transmit RF signal towards tag. Tag gather energy from RF signal by using inductive
coupling in case of LF and HF tag and backscatter coupling in case of UHF tag . These are
shown in figure 4.

18
Backscattering coupling uses electromagnetic waves and inductive coupling uses magnetic field
to exchange data between tag and reader.
Inductive Coupling
An inductively coupled tag consist of an electronic data carrying device, usually a single
microchip and a large area coil that functions as an antenna. These always operate passively.
This means that it gets its power from reader side. For this purpose, the reader's antenna coil
generates a strong electro-magnetic field, which penetrates the cross-section of the coil area and
the area around the coil. A small part of the emitted field penetrates the antenna coil of the
transponder. By induction, a voltage is generated in the transponder's antenna coil. This voltage
is rectified and acts as the power supply for microchip. Inductively coupled systems are based
upon a transformer-type coupling between the primary coil in the reader and the secondary coil
in the transponder. This is true when the distance between the coils does not exceed 0.16 l, so
that the transponder is located in the near field of the transmitter antenna.
Backscatter Coupling
We know from the field of RADAR technology that electromagnetic waves are reflected by
objects with dimensions greater than half the wavelength of the wave. The efficiency with which
an object reflects electromagnetic waves is described by its reflection cross-section. A tuned
receiving antenna retransmits a portion of incident RF energy. This retransmission is known as
backscattering if it is in the direction of the original transmitter. This backscattering can be
detected by another antenna.
Advantages and Limitations of RFID System
The RFID technology has many advantages [47]. While having advantages this technology also
has some disadvantages. Table 2 presents advantages and disadvantages of RFID.

19
Table 2: Advantages and disadvantages of RFID

3.3 RFID APPLICATIONS


RFID technology has received more and more attention in many areas like manufacturing
companies, agriculture, hospitality [39], industries, parking management [40] and transportation
[41] sectors. Major applications of RFID are given below:

Healthcare Applications
RFID applications in healthcare [47] could save important resources that can further contribute
to better patient care. RFID applications could reduce the number of errors by tagging medical
objects in the healthcare setting such as patients‟ files and medical equipment tracking in a
timely manner. RFID further improves the situation for patients‟ care by integrating medical
objects involved throughout the patients‟ care. RFID based timely information about the location
of objects would increase the efficiency and effectiveness of paramedical staff leading to
improved patients‟ experience [42, 43].

Baggage Applications
Airline industries, package and delivery service lose a lot of money on lost or late delivery of

20
baggage/packages [47]. Handling large amount of packages from many places to various
destinations on different routes can be very complex. In this scenario RFID application provide
best resource management, effective operation and efficient transfer of packages. RFID helps to
identify the packages, and provide records that can advice the industry on possible areas that may
require some improvements. It also keeps customers informed about their packages.

Toll Road Applications


RFID applications make the toll collection/charging better with improved traffic flow, as
cars/vehicles cannot pass through toll stations without stopping for payment. RFID is used to
automatically identify the account holder and make faster transactions [47]. This application
helps to keep good traffic flow and to identify traffic patterns using data mining techniques that
can inform the administration or decision support systems. For example, the information can be
used to report the traffic conditions or to extend and develop future policies [44].

Asset Tracking and Locating Objects


RFID can be used to prevent misplacement of items, or to locate items. An asset is tagged with
RFID chip for its physical verification. A database is used to keep track of item movements.

Libraries of RFID Labels


RFID can be use in library for management of the books. For this management RFID use many
components like tag, reader, self check-out/in, book drop reader, middleware etc. With the help
of these components, it manages the process of borrowing and return the book. RFID remembers
to be already borrowed books while borrowing the book and already returned book while
returning the book.

Animal Identification
This is one of earliest RFID application. RFID tag can be injected to remain under skin of
animal [37]. This process is less painful and there is no identification mark with the help of
which tag can be removing or modify. RFID chip inside tag is „Read-only‟ so data cannot be
modified. This chip contains many information like date of birth, last vaccination done, any
medical history and distinguishing features about the animal.

21
Anti-Theft System
Any item can be protected by using RFID anti-theft tag [37] tag is attached by a strong string or
a plastic band to the item. If anyone walks to the exit with this item, RFID door antennas placed
near exit will detect the presence of tag and sound an alarm.

Waste Management
RFID can be used for waste management [37] also. RFID tag is attached to each waste bin and
every garbage truck has RFID reader attached to it. When waste bin is emptied into truck then
reader read tag and transmits data to truck driver’s cabin wirelessly. At end of route data is
transmitted to central server. This data includes waste bin number, collected at what time, who
was waste collector.

National Identification
National identification has been a biggest problem for all the countries. For identification RFID
technology can be used [37]. A user has only a single card with embedded RFID chip. This
RFID tag number then points to an online database which is accessed by multiple agencies. A
single ID card needs to be issued for identification.

22
SECTION IV

4.0 CONCLUSION:

The seminar gave an overview of current state and trends of RFID technology. RFID technology
will open new doors to make organizations, companies more secure, reliable, and accurate. The
first part of this seminar has explained and described the RFID technology and its components,
and the second part has discussed the RFID technology in terms of advantages and limitations.
The last part explores RFID technology applications. The seminar considers RFID technology as
a means to provide new capabilities and efficient methods for several applications.

23
References:
[1] Bose, I., & Lam, C. W. (2008). Facing the challenges of RFID data management.
International Journal of Information Systems and Supply Chain Management, 1(4), 1-19.
[2] Chuang, M., & Shaw, W. H. (2008). An empirical study of enterprise resource management
systems implementation: From ERP to RFID. Business Process Management Journal, 14(5),
675-693.
[3] Afsharian, S. P., Alizadeh, A., &Chehrehpak, M. (2016). Effects of applying radio frequency
identification in supply chain management: An empirical study of manufacturing enterprises.
International Journal of Business Information Systems, 23(1), 97-115.
[4] Zelbst, P. J., Green Jr., K. W., & Sower, V. E. (2010a). Impact of RFID technology
utilization on operational performance. Management Research Review, 33(10), 994-1004.
[5] Musa, A., &Dabo, A. -. A. (2016). A review of RFID in supply chain management: 2000–
2015. Global Journal of Flexible Systems Management, 17(2), 189-228.
[6] Lim, M. K., Bahr, W., & Leung, S. C. (2013). RFID in the warehouse: A literature analysis
(1995–2010) of its applications, benefits, challenges and future trends. International Journal of
Production Economics, 145(1), 409-430.
[7] Lee, D., & Park, J. (2008). RFID-based traceability in the supply chain. Industrial
Management and Data Systems, 108(6), 713-725.
[8] Chen, H., &Papazafeiropoulou, A. (2012). An empirical study for radio frequency
identification (RFID) adoption by SMEs in the Taiwanese information technology (IT) industry.
Asian Academy of Management Journal, 17(2), 39-58.
[9] Azuara, G., Tornos, J. L., & Salazar, J. L. (2012). Improving RFID traceability systems with
verifiable quality. Industrial Management & Data Systems, 112(3), 340-359.
[10] Lee, Y. M., Cheng, F., & Leung, Y. T. (2009). A quantitative view on how RFID can
improve inventory management in a supply chain. International Journal of Logistics Research
and Applications, 12(1), 23- 43.
[11] Johansson, O., & Pålsson, H. (2009). The impact of auto-ID on logistics performance: A
benchmarking survey of Swedish manufacturing industries. Benchmarking, 16(4), 504-522.
[12] Wang, Y., Wang, Y., & Yang, Y. (2010). Understanding the determinants of RFID adoption
in the manufacturing industry. Technological Forecasting and Social Change, 77(5), 803-815.

24
[13] Reyes, P. M., Li, S., & Visich, J. K. (2016). Determinants of RFID adoption stage and
perceived benefits. European Journal of Operational Research, 254(3), 801-812.
[14] Fosso Wamba, S., Gunasekaran, A., Bhattacharya, M., & Dubey, R. (2016). Determinants
of RFID adoption intention by SMEs: an empirical investigation. Production Planning &
Control, 27(12), 979- 990. [15] Huang, G. Q., Zhang, Y. F., & Jiang, P. Y. (2008). RFID-based
wireless manufacturing for real-time management of job shop WIP inventories. The International
Journal of Advanced Manufacturing Technology, 36(7-8), 752-764.
[16] Fan, T., Tao, F., Deng, S., & Li, S. (2015). Impact of RFID technology on supply chain
decisions with inventory inaccuracies. International Journal of Production Economics, 159, 117-
125.
[17] Sarac, A., Absi, N., & Dauzère-Pérès, S. (2010). A literature review on the impact of RFID
technologies on supply chain management. International Journal of Production Economics,
128(1), 77-95.
[18] Dai, Q., Zhong, R., Huang, G. Q., Qu, T., Zhang, T., & Luo, T. Y. (2012). Radio frequency
identificationenabled real-time manufacturing execution system: a case study in an automotive
part manufacturer. International Journal of Computer Integrated Manufacturing, 25(1), 51-65.
[19] Zhang, Y., Qu, T., Ho, O. K., & Huang, G. Q. (2011). Agent-based smart gateway for
RFID-enabled real-time wireless manufacturing. International Journal of Production Research,
49(5), 1337-1352.
[20] Kumar, V. V., & Chan, F. T. S. (2011). A superiority search and optimisation algorithm to
solve RFID and an environmental factor embedded closed loop logistics model. International
Journal of Production Research, 49(16), 4807-4831.
[21] Chang, S. I., Hung, S. Y., Yen, D. C., & Chen, Y. J. (2008). The determinants of RFID
adoption in the logistics industry-A supply chain management perspective. Communications of
the Association for Information Systems, 23(1), 12.
[22] Lin, L. C. (2009). An integrated framework for the development of radio frequency
identification technology in the logistics and supply chain management. Computers & Industrial
Engineering, 57(3), 832-842.
[23] Pool, J. K., Arabzad, S. M., Asadi, A., & Ansari, M. R. (2015). RFID acceptance in SMEs
using TOE framework: An empirical investigation on Iranian SMEs. International Journal of
Logistics Systems and Management, 21(3), 335-347.

25
[24] Chen, J. C., Cheng, C. H., & Huang, P. B. (2013b). Supply chain management with lean
production and RFID application: A case study. Expert Systems with applications, 40(9), 3389-
3397. [25] Alyahya, S., Wang, Q., & Bennett, N. (2016). Application and integration of an
RFID-enabled warehousing management system–a feasibility study. Journal of Industrial
Information Integration, 4, 15- 25. [26] Ngai, E. W., Cheung, B. K., Lam, S. S., & Ng, C. T.
(2014). RFID value in aircraft parts supply chains: A case study. International Journal of
Production Economics, 147, 330-339.
[27] Ramudhin, A., Paquet, M., Artiba, A., Dupré, P., Varvaro, D., & Thomson, V. (2008). A
generic framework to support the selection of an RFID-based control system with application to
the MRO activities of an aircraft engine manufacturer. Production Planning and Control, 19(2),
183-196
[28] Shamsuzzoha, A. H. M., Ehrs, M., Addo-Tenkorang, R., Nguyen, D., & Helo, P. T. (2013).
Performance evaluation of tracking and tracing for logistics operations. International Journal of
Shipping and Transport Logistics, 5(1), 31-54
[29] Zhou, S., Ling, W., & Peng, Z. (2007). An RFID-based remote monitoring system for
enterprise internal production management. The International Journal of Advanced
Manufacturing Technology, 33(7-8), 837-844.
[30] Kwok, S. K., Ting, S. L., Tsang, A. H. C., & Cheung, C. F. (2010). A counterfeit network
analyzer based on RFID and EPC. Industrial Management and Data Systems, 110(7), 1018-1037.
[31] Chen, J. C., Cheng, C. H., Huang, P. B., Wang, K. J., Huang, C. J., & Ting, T. C. (2013a).
Warehouse management with lean and RFID application: a case study. The International Journal
of Advanced Manufacturing Technology, 69(1-4), 531-542.
[32] Ustundag, A. (2010). Evaluating RFID investment on a supply chain using tagging cost
sharing factor. International Journal of Production Research, 48(9), 2549-2562.
[33] Nativi, J. J., & Lee, S. (2012). Impact of RFID information-sharing strategies on a
decentralized supply chain with reverse logistics operations. International Journal of Production
Economics, 136(2), 366-377.
[34] Zelbst, P. J., Jr, K. W. G., Sower, V. E., & Baker, G. (2010b). RFID utilization and
information sharing: The impact on supply chain performance. Journal of Business and Industrial
Marketing, 25(8), 582-589.

26
[35] Zelbst, P. J., Green, K. W., Sower, V. E., &Abshire, R. D. (2014). Impact of RFID and
information sharing on JIT, TQM and operational performance. Management Research Review,
37(11), 970-989.
[36]. Wenting Wang, Shuzuo Lou, Kay W. C. Chui, Sujiang Rong, Chi Fung Lok, Hui Zheng,
Hin-Tat Chan, Sau-Wing Man, Howard C. Luong, Vinvent K. Lau, and Chi-Ying Tsui, 2007. “A
Single-Chip UHF RFID Reader in 0.18 μm CMOS”. IEEE Custom Integrated Circuits
Conference (CICC), San Jose, USA, PP. 111-114.
[37] Sam Polniak, “RFID case study book: RFID application stories from around the globe”
Abhisam software, 2007
[38] Elisabeth Ilie-Zudor, Zsolt Kemeny, Peter Egri, Laszlo Monostori, “RFID technology
and its current application,” The Modern Information Technology in the Innovation
Processes of the Industrial Enterprises-MITIP 2006, ISBN 963 86586 5 7, pp.29-36.
[39] Basar Oztaysi, Serdar Baysan and Fatma Akpinar, “Radio Frequency Identification,
(RFID) in Hospitality,”Technovation, Vol 29,pp. 618–624, 2009.
[40] M. Y. I. Idris, E. M. Tamil, Z. Razak, N. M. Noor, and L.W. Km, “Smart parking system
using
image processing techniques in wireless sensor network environment,” Information Technology
Journal, Vol 8, pp. 114–127, 2009.
[41] Kashif Ali and Hossam Hassanein, “Passive RFID for ntelligent transportation systems,” 6th
IEEE Consumer Communications and Networking Conference, CCNC 2009, January 10 -
January 13, 2009.
[42] K. Ahsan, H. Shah, P. Kingston, “Context Based Knowledge Management in Healthcare:
An
EA Approach”, AMCIS 2009, Available at AIS library.
[43] K. Ahsan, H. Shah, P. Kingston, “Role of Enterprise Architecture in healthcare IT”,
Proceeding ITNG2009, IEEE.
[44] S. Shepard, (2005), “RFID Radio Frequency Identification”, (2005), USA, ISBN:0-07
144299-5.
[45] S. P. Singh, M. Mccartney, J. Singh, And R. Clarke, “RFID Research And Testing For
Packages Of Apparel, Consumer Goods And Fresh Produce In The Retail Distribution
Environment,” Packaging Technology and Science, Vol. 21,pp. 91–102, 2008.

27
[46] Frederick E Terman, Radio Engineers Handbook, McGraw Hill, 1943, pages 785 – 786
[47] Kamran Ahsan, Hanifa Shah and Paul Kingston, “RFID Applications: An Introductory and
Exploratory Study,” IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1,
No. 3, January 2010.

28

You might also like