Professional Documents
Culture Documents
Application
We hereby declare that the thesis is based on our original work except for quotations and
citations which have been duly acknowledged and we allow our thesis to be placed at the
NFC Institute of Engineering and Fertilizers Research Faisalabad with the following
conditions:
1. Thesis becomes the property of NFC Institute of Engineering and Fertilizer Research
Faisalabad
2. NFC Institute of Engineering and Fertilizer Research Faisalabad may make copies of
the
thesis for academic purposes only.
Signature
1. AZEEM ASGHAR
2. MUHAMMAD ATIF
3. SAQIB NAEEM
Date:_______________________________
1
NFC Institute of Engineering & Fertilizer Research Faisalabad
The undersigned certify that they have read and recommend to the Graduate Studies Program
for acceptance of this thesis for the fulfillment of the requirements for the degree stated.
Signature: ____________________________
Supervisor: Dr. AsimQuddus
Signature: ____________________________
Co-Supervisor: Dr. Salman Arain
Signature: ____________________________
External Examiner: ____________________________
Signature: ____________________________
Head of Department: Dr. Badar-ul-Islam
Date:
2
Implementation of RFID using IOT Applications
BY
1. AZEEM ASGHAR 2018-UET-IEFR/FD-ELECT-29
Thesis
FAISALABAD-PAKISTAN
MARCH 2022
3
DEDICATION
4
Contents
ACKNOWLEDGEMENTS.........................................................................................................................6
ABSTRACT................................................................................................................................................7
LIST OF FIGURES.....................................................................................................................................8
LIST OF TABLES......................................................................................................................................9
LIST OF ABBREVIATIONS....................................................................................................................10
CHAPTER 1..............................................................................................................................................13
INTRODUCTION.....................................................................................................................................13
1. Project Motive:..............................................................................................................................14
2. Background....................................................................................................................................14
3. Methodology:................................................................................................................................16
i. Temperature sensor:...................................................................................................................17
ii. Pulse sensor:..............................................................................................................................17
iii. RFID:.........................................................................................................................................17
iv. Arduino IDE..............................................................................................................................18
v. Flow chart:.................................................................................................................................18
4. Solution overview:.........................................................................................................................20
5. Expected results:............................................................................................................................20
CHAPTER 2..............................................................................................................................................21
LITERATURE REVIEW..........................................................................................................................21
1. Introduction:..................................................................................................................................21
2. Internet of things (IOT):................................................................................................................22
3. Wireless sensor networks (WSN):.................................................................................................22
4. Cloud computing:..........................................................................................................................23
5. IOT applications:...........................................................................................................................23
6. IOT applications to enhance customer value:................................................................................24
7. Monitoring and control:.................................................................................................................24
8. Information sharing and collaboration:..........................................................................................25
9. Evolution of the foundational IOT technologies:...........................................................................26
10. RFID technology:......................................................................................................................30
i. RFID principles:........................................................................................................................30
ii. Physics behind the RFID:..........................................................................................................31
5
11. Ward Current Situation:.............................................................................................................33
i. Improvement Needed:................................................................................................................33
ii. Our Work:..................................................................................................................................34
iii. Temperature sensor:...................................................................................................................34
iv. Pulse sensor:..............................................................................................................................35
12. Discussion on Current Dilemmas:.............................................................................................36
13. Arduino IDE..............................................................................................................................37
14. Related Work:............................................................................................................................39
6
LIST OF ABBREVIATIONS
IR Infrared
7
SQL Structured query language
ACKNOWLEDGEMENTS
First and foremost, we must thank our research supervisors, DR ASIM QUDDUS
completed without their assistance and committed participation in every step of the
process. We want to thank you for your support and understanding over the last four
years. We are thankful for sharing their expertise and experience with other faculty
8
ABSTRACT
A person wants its medical checkup quickly and efficiently and also wants continuous
monitoring by doctor or staff member and our project deals with this as it is related to E-
health. The main purpose of the project is to provide quick basic checkup and to continuously
monitor the health of the person entering the ward. As our project includes IOT, the
responsible person can be able to monitor patient’s health from his room or office. RFID
technology is used for person’s identification entering the ward and their details would be
store using an application. We have studied about IOT, health monitoring system, RFID
technology and how different sensors work. It is difficult to give quality time and continuous
care to patients in rushy hospital wards. Therefore , we finally concluded that E- health is the
most efficient method to monitor the health of the person.
9
It includes various sensors like temperature sensor, pulse sensor and motion sensor. In a
special case if the person is partially paralyzed, a hand motion recognition circuit is provided
to the patient to help patient convey various messages to doctor/ staff member at office over
internet.
LIST OF FIGURES
Figure 1.1: Flow chart diagram .....................................................................................16
10
LIST OF TABLES
Table 2.1: Evolution of key IoT technologies............................................................23
Table 2.2: Normal and Abnormal body conditions ...................................................23
Table 2.3: Normal and Abnormal blood pressure................................... ..................24
11
CHAPTER 1
INTRODUCTION
Internet of things (IOT) includes a wide range of field and is modern field of research. IOT
makes our life smarter, more efficient and easier. We can monitor a warehouse through IOT
and it can also be used in smart home automation. Several life threatening diseases can be
easily monitored by IOT based systems. The main problem in the wards of hospital especially
in government hospitals , there are a lot of patients, doctors and staff members are unable to
provide quick checkup and monitoring of the patients. Smart health monitoring devices
determine the health condition i.e. rate of pulse, body temperature and respiratory rate etc. by
using sensors.
It requires different sensors to monitor the health and for the automation of the prototype. It is
a moveable device which can be implemented in the ward easily. On the whole it is designed
for the identification of person, continuous monitoring and patient can convey his messages
over internet to responsible person in his office or room.
An IoT ecosystem consists of web-enabled smart devices that use embedded systems, such as
processors, sensors and communication hardware, to collect, send and act on data they
acquire from their environments. IoT devices share the sensor data they collect by connecting
to an IoT gateway or other edge device where data is either sent to the cloud to be analyzed
12
or analyzed locally. Sometimes, these devices communicate with other related devices and
act on the information they get from one another. The devices do most of the work without
human intervention, although people can interact with the devices -- for instance, to set them
up, give them instructions or access the data.
The Internet of Things is redefining healthcare as we know it. We’re moving on to a whole
new level when it comes to the way that apps, devices and people interact when delivering
healthcare solutions. IoT has given us a fresh outlook as new tools that accommodate an
integrated healthcare network, subsequently the care that is provided is of a higher standard.
The use of IoT in healthcare allows for the automation of processes that have previously
taken time; these processes previously allowed human error. For example, nowadays many
hospitals use connected devices to control the airflow and temperature in operating theatres.
The advantages of IOT in healthcare are seemingly endless, but here’s just a few of the major
benefits: IOT allows for the accurate collection of data, automated workflows and minimized
waste, but most importantly it reduces the risk of error. With IOT, patient monitoring can be
done in real-time, drastically cutting down the need for doctors going out and making visits.
Connected home care facilities will also help reduce hospital stays and re-admissions. Better
patient experience – A connected healthcare system creates an environment that meets each
patient’s needs. Dedicated procedures, enhanced treatment options and improved diagnosis
accuracy make for a better patient experience. With real-time data healthcare providers can
continuously monitor patients. This means that they can spot any disease before it spreads
and becomes serious. Sensors are installed onto various pieces of medical apparatus (e.g.
heart rate monitors) by the bedside of a patient. The data gathered is sent to the hospital
where a qualified member of staff analyses it for any abnormalities. The developments of IoT
have the potential to really revolutionise healthcare in a positive way. However we must be
careful. Health data is sensitive and if it’s shared inappropriately or misused has the potential
to damage people’s privacy. Ensuring hospitals have secure and manageable infrastructure is
essential in the healthcare sector.
With the emergence of intelligent technologies in this age of information from the global context,
advanced artificial intelligence (AI) techniques promise massive applications in a variety of sectors.
AI and ML, which have been successfully applied in a wide range of research areas is also proven
efficient and better in health sector. AI and ML can play a significant role in addressing the healthcare
and social sector challenges that health sector is facing.
13
i. Project Motive:
The importance of IOT Based Health Monitoring System is one which cannot be ignored.
The patient’s health and ward management is very important. We hope that our project will
be advantageous for the health monitoring in. It will be simple enough, easy to use, and
independent platform for the users to feel convenient while using it. Moreover, by gathering
real-time information automatically, it increases personal and decision makers' knowledge of
security.
ii. Background
Different E-health monitoring systems have been used accordingly. Temperature and pulse
sensors and RFID technology has been used separately. The main feature of our project is
that we are using all the sensors, IOT technology and RFID technology simultaneously. The
data of an individual would be stored and health will be monitored. It is a portable device
having different features and no such work has been done before. Data storage using an
application is advanced technology and it would help to monitor and store data of the patient.
There is considerable international interest in exploiting the potential of digital health care
solutions, often referred to as E-Health—the use of information and communication
technologies—to enhance the quality and safety of health care. Often accompanied by large
costs, any large-scale expenditure on E-Health—such as electronic health records, picture
archiving and communication systems, e-Prescribing, associated computerized provider order
entry systems, and computerized decision support systems—has tended to be justified on the
grounds that these are efficient and cost-effective means for improving health care. United
Kingdom has invested at least £12.8 billion in a National Program for Information
Technology for the National Health Service, and the Obama administration in the United
States has committed to a US$38 billion E-Health investment in health care. When searching
the internet (using Google) by using search terms such as ‘‘e-health solutions and patient
involvement,’’ very sparse information can be found, and at present, it is not possible to
perform literature searches due to very limited published results. However, a ‘‘hub’’ of e-
health providers has undertaken the task of providing a global overview of the e-health
solutions available. Solution providers, consultants advising the healthcare system, and
healthcare professionals have been prompted on the internet to contribute with solutions for
patient better and efficient monitoring. It has been the hub’s aim that all the solutions should
be made available across all hospitals. With the hub’s permission, we present an overview of
the assembled solutions, their functionality, and their distribution by country.
14
Technology plays an important role in today's world like industries, personal life's,
environment and agriculture fields. Among these fields health care process is the most
important field and crucial also. The improvement of medical equipment and devices also
plays a significant contribution for technology development in health care devices. Patient's
also connect video conference to the physicians for improving their health status. It also
reduces patient's money and waiting time at hospitals. Using this technology development,
patient's health status should be recorded in their own mobile phone, in the doctor,s approach
then store the data.
iii. Methodology:
A person will be provided RFID card by the management. When a person entering the ward,
first he has to swipe the card on RFID for the identification whether he is the registered or not
by the ward management. After the identification of the person, the pulse rate would be
calculated using the pulse sensor and the temperature would be measured using the infrared
temperature sensor. And the calculated results will be send to the doctor or responsible
15
person by an application, the temperature and pulse will be monitored continuously by the
sensors. And if , in a special case a patient is partially paralyzed , a hand motion recognition
circuit will be provided to the patient so he can convey his messages to the doctor or loved
one in his place over the internet. During the whole scenario the data of the patient will be
stored on a data server named as SQL server using IOT technology. An application named as
Visual studio is used for the design of the system.
v. Pulse sensor:
Pulse Sensor is a well-designed plug-and-play heart-rate sensor for Arduino. It can be
used by students, artists, athletes, makers, and game & mobile developers who want to easily
incorporate live heart- rate data into their projects.
vi. RFID:
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify
and track tags attached to objects. An RFID system consists of a tiny radio transponder, a
radio receiver and transmitter. When triggered by an electromagnetic interrogation pulse from
a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory
number, back to the reader. This number can be used to track inventory goods.
16
Adoption of RFID in the medical industry has been widespread and very effective. Hospitals
are among the first users to combine both active and passive RFID. Active tags track high-
value, or frequently moved items, and passive tags track smaller, lower cost items that only
need room-level identification. Medical facility rooms can collect data from transmissions of
RFID badges worn by patients and employees, as well as from tags assigned to items such as
mobile medical devices.
Figure 1.1
17
1.3 Project designing hardware:
Arduino UNO
Temperature sensor (MLX-90614)
Pulse sensor
RFID tag and reader
Door
PIR module (HCSR-501)
Atmega Microcontroller
Accelerometer & Gyro
ESP8266 Wifi Module
RF Tx Rx
LCD Display
Crystal Oscillator
Resistors
Capacitors
Transistors
Cables and Connectors
Diodes
PCB and Breadboards
LED
Transformer/Adapter
Push Buttons
Switch
IC
IC Sockets
18
ix. Solution overview:
In the past, the monitoring of temperature is manually conducted by a person standing at
the entrance. This is a quick and efficient method as campare to the past. We provide a
portable system which monitors the temperature using sensor placed at the station. New
technology added more devices with wireless technology and accessed those devices over
the internet. We do not need a professional firm to track our security systems anymore.
x. Expected results:
The expected results will be through the application which will detect the health and
identity at the same time of the individual within a certain time.
19
CHAPTER 2
LITERATURE REVIEW
We write some aspects about the history of health monitoring system. Sensor technology,
RFID and E-health have provided us the necessary information about the background.
1. Introduction:
The rapid development of information communication and technology (ICT) has made
for logistics (mainly within the context of 4.0 industry) or people monitoring for security and
safety applications. In recent years, the internet of things (IOT) [1, 2] and sensor networks [2-
The implementation of ICT systems for automation of logistics and management in hospitals
(i) The use of disposable, low-cost sensors, which will be tagged to the patients,
(ii) The connectivity between hardware (readers, end-user mobile devices, servers
with their databases located at the hospital ICT department) should be adapted to
networks. Among the advantages provided by ICT systems for location and
20
ii. Internet of things (IOT):
The unpredictable growth of the “Internet of Things” is changing the world and the rapid
drop in price for typical IOT components is allow public to innovate new designs and
products at home. IOT can be used in monitoring patient’s health, for making smart home
and smart city. The unexpected occurrence in patient’s are monitored using IOT. In this paper
specialized sensor is used to monitor patient’s heart rate, body temperature, body movement
equipped devices to monitor physical or environmental conditions and can cooperate with
RFID systems to better track the status of things such as their location, temperature, and
movements (Atzori,Iera,& Morabito, 2010). WSN allow different network topologies and
and wireless communications have made available efficient, low-cost, low-power miniature
devices for use in WSN applications (Gubbi, Buyya, Marusic, & Palaniswami, 2013). WSN
have primarily been used in cold chain logistics that employ thermal and refrigerated
White & Cheong, 2012). WSN are also used for maintenance and tracking systems. For
example, General Electric deploys sensors in its jet engines, turbines, and wind farms. By
analyzing data in real time, GE saves time and money associated with preventive
21
iv. Cloud computing:
Cloud computing is a model for on-demand access to a shared pool of configurable resources
(e.g., computers, networks, servers, storage, applications, services, software) that can be
most important outcomes of the IoT is an enormous amount of data generated from devices
connected to the Internet (Gubbi et al., 2013). Many IoT applications require massive data
storage, huge processing speed to enable realtime decision making, and high-speed
broadband networks to stream data, audio, or video. Cloud computing provides an ideal back-
end solution for handling huge data streams and processing them for the unprecedented
v. IOT applications:
The IOT facilitates the development of myriad industry-oriented and user-specific IOT
applications. Whereas devices and networks provide physical connectivity, IOT applications
enable device-to device and human-to-device interactions in a reliable and robust manner.
IOT applications on devices need to ensure that data/messages have been received and acted
upon properly in a timely manner. For example, transportation and logistics applications
monitor the status of transported goods such as fruits, fresh-cut produce, meat, and dairy
products. During transportation, the conservation status (e.g., temperature, humidity, shock)
is monitored constantly and appropriate actions are taken automatically to avoid spoilage
when the connection is out of range. For example, FedEx uses Sense Aware to keep tabs on
the temperature, location, and other vital signs of a package, including when it is opened and
whether it was tampered with along the way. While device-to-device applications do not
necessarily require data visualization, more and more human-centered IOT applications
22
understand way and to allow interaction with the environment. It is important for IOT
applications to be built with intelligence so devices can monitor the environment, identify
problems, communicate with each other, and potentially resolve problems without the need
IOT for enterprises (e.g., Chui, Lo¨ffler, & Roberts, 2010). Based on the technology trends
and literature review, this article identifies three IOT categories for enterprise applications:
(1) monitoring and control, (2) big data and business analytics, and (3) information sharing
and collaboration. Understanding how these three IOT categories can enhance the customer
discusses the three IOT categories, along with an illustration of real-world IOT applications
environmental conditions, and allow managers and automated controllers to constantly track
performance in real time anywhere, anytime. Advanced monitoring and control technologies
such as smart grid and smart metering reveal operational patterns, spot areas of potential
improvement, or predict future outcomes and optimize operations, leading to lower costs and
higher productivity. The smart home is known to be at the forefront of innovation regarding
IoT monitoring and control systems. The primary value propositions are family and property
protection and energy savings. For example, the Verizon Home Monitoring and Control
network uses a wireless communications technology designed specifically for remote control
monitored and controlled outside the user’s home through a computer, tablet, or smartphone.
23
The Verizon Home Monitoring and The Internet of Things (IOT): Applications, investments,
and challenges for enterprises 433 Control network allows users to adjust the lights, control
the climate, manage the security system, receive automatic event notifications, and even lock
and unlock doors. The IOT is also used to monitor and control various components in cars.
The primary customer value propositions are drivers’ personalized experience and
satisfaction. Ford and Intel teamed up in 2014 to explore new opportunities to personalize the
user experience using facial recognition software and a mobile phone app. The joint research
offer improved privacy controls and to identify different drivers and automatically adjust
further by displaying information specific to the driver, such as his/her calendar, music, and
contacts. The customer value propositions are appropriately integrated into the connected car
and things, and between things. Sensing a predefined event is usually the first step for
information sharing and collaboration. In the supply chain area, information sharing and
collaboration enhance situational awareness and avoid information delay and distortion. For
example, if sensors are placed throughout a retail store where refrigeration is necessary, alerts
can be sent to the store manager’s mobile device whenever the refrigerators malfunction. The
manager can then check the employee status report to see who is available and send task
assignments to that employee via his or her IOT-enabled mobile device. To enhance
information sharing and collaboration with shoppers, Macy’s is deploying shop kick’s shop
Beacon technology, an enhanced mobile location based technology that uses ultrasound
Bluetooth Low Energy (BLE). Shop Beacon provides shop kick app users with personalized
24
department-level deals, discounts, recommendations, and rewards. As shoppers enter Macy’s,
shop Beacon reminds those shop kick app users who have opted in. This enhancement in
Macy’s information sharing with shoppers allows for increased consumer engagement and
promotional and marketing relevancy that lead to higher customer satisfaction and increase
revenues. In September 2014, following a pilot test of the application, Macy’s decided to roll
out shop Beacon in all of its 4,000 U.S. locations. Other major retailers such as Target,
American Eagle Outfitters, and JCP enney also partnered with shop kick and launched shop
them is 434 I. Lee, K. Lee growing rapidly. According to Bradley, Barbier, and
Handler(2013),the IOT will generate $14.4 trillion in value; the combination of increased
revenues and lower costs will migrate among companies and industries from 2013 to 2022.
From an industry perspective, four industries make up more than half of the $14.4 trillion in
value. These leading four industries in terms of value at stake include manufacturing at 27%;
retail trade at 11%; information services at 9%; and finance and insurance, also at 9%. Other
industries such as wholesale, healthcare, and education lag behind in terms of value
generation, with a range between 1% and 7%. Much of the value for manufacturers comes
from greater agility and flexibility in factories, and from the ability to make the most of
workers’ skills. Additionally, a large amount of the value for retailers comes from connected
marketing and advertising. Geographic distributions of the value are heavily driven by each
region’s relative economic growth rate and by the relative size of industry sector in each
region. In the United States, $4.6 trillion of value is most prevalent in the services area.
However, in China, $1.8 trillion of value is derived from rapid economic growth, mainly in
25
the manufacturing sector. Table 2.3 shows projected evolution in the area of foundational
IOT technologies: network, software and algorithms, hardware, and data processing. The
network is the backbone of the IOT. It refers to uniquely identifiable objects (things) and
autonomous network. Objects rely on software to communicate effectively with each other
and to deliver enhanced functionality and connectivity. Software should be developed with
the IOT’s interoperability, connectivity, privacy, and security requirements in mind. The
$3.2 billion in cash to buy Nest, a smart thermostat business, demonstrates the value of
hardware in the IOT. Hardware is innovatively designed and robustly produced, driven by the
consumerized IOT devices which have myriad features, functionalities, and operating
environments. While RFID tags and sensors have been the focus of hardware innovation,
hardware evolution. IOT devices generate enormous quantities of data that need to be
aggregated and analyzed in real time to provide information regarding status, location,
functionality, and environment of the devices. The traditional data processing method does
not work well in the real-time streaming data process of the IOT environment. Since
processing large quantities of IOT data in real time will increase workloads of data centers at
an exponential rate, data processing will become more context-aware, optimized, and
cognitive. In the IOT environment, a large number of devices are connected with each other,
and it is not feasible to process all the streaming data available to those devices. Context-
aware data processing enables sensors and devices to use context-specific information such as
26
location, temperature, and the availability of a certain device to decide what data to collect
For example, context-aware data processing can deliver relevant information to a user by
knowing the user’s current location (e.g., within a department store, a park, or a museum).
Cognitive data processing integrates the human cognition process into IOT applications.
Rather than being programmed to deal with every possible data-processing need, a cognitive
For example, cognitive data processing uses image recognition techniques to understand the
surrounding environment, processes data for a user, and utilizes feedback from the user to
learn further. The optimization of data processing is critical to timely processing of the
processing help make timely decisions in time-critical big data applications such as smart
27
Table 2.1 Evalution of Key IOT technologies
Before 2010 2010-2015 2015-2020 Beyond 2020
28
x. RFID technology
In recent years, radio frequency identification technology has moved from obscurity into
mainstream applications that help speed the handling of manufactured goods and materials.
RFID enables identification from a distance, and unlike earlier bar-code technology (see the
sidebar), it does so without requiring a line of sight. RFID tags support a larger set of unique
IDs than bar codes and can incorporate additional data such as manufacturer, product type,
and even measure environmental factors such as temperature. Furthermore, RFID systems
can discern many different tags located in the same general area without human assistance. In
contrast, consider a supermarket checkout counter, where you must orient each bar-coded
item toward a reader before scanning it. So why has it taken over 50 years for this technology
to become mainstream? The primary reason is cost. For electronic identification technologies
to compete with the rock-bottom pricing of printed symbols, they must either be equally low-
cost or provide enough added value for an organization to recover the cost elsewhere. RFID
isn’t as cheap as traditional labeling technologies, but it does offer added value and is now at
a critical price point that could enable its large-scale adoption for managing consumer retail
goods. Here I introduce the principles of RFID, discuss its primary technologies and
applications, and review the challenges organizations will face in deploying this technology.
[7]
i. RFID principles:
Many types of RFID exist, but at the highest level, we can divide RFID devices into two
classes: active and passive. Active tags require a power source—they’re either connected to a
powered infrastructure or use energy stored in an integrated battery. In the latter case, a tag’s
lifetime is limited by the stored energy, balanced against the number of read operations the
device must undergo. One example of an active tag is the transponder attached to an aircraft
that identifies its national origin. Another example is a Lo Jack device attached to a car,
which incorporates cellular technology and a GPS to locate the car if stolen. However,
29
batteries make the cost, size, and lifetime of active tags impractical for the retail trade.
Passive RFID is of interest because the tags don’t require batteries or maintenance. The tags
also have an indefinite operational life and are small enough to fit into a practical adhesive
label. A passive tag consists of three parts: an antenna, a semiconductor chip attached to the
antenna, and some form of encapsulation. The tag reader is responsible for powering and
Radio frequency identification (RFID) allows automatic identification and data capture using
radio waves, a tag, and a reader. The tag can store more data than traditional barcodes. The
tag contains data in the form of the Electronic Product Code (EPC), a global RFID-based
item identification system developed by the Auto-ID Center. Three types of tags are used.
Passive RFID tags rely on radio frequency energy transferred from the reader to the tag to
power the tag; they are not battery-powered. Applications of these can be found in supply
chains, passports, electronic tolls, and item-level tracking. Active RFID tags have their own
battery supply and can instigate communication with a reader. Active tags can contain
RFID tags are used in manufacturing, hospital laboratories, and remote-sensing IT asset
management. Semi-passive RFID tags use batteries to power the microchip while
communicating by drawing power from the reader. Active and semi-passive RFID tags cost
identification of objects, animal and people associated with the transponder (so-called tag)
that can be brought, stuck, attached, implanted etc. The communication is established
between a dedicated reader is generally distributed to a remote database. For instance, the ID
30
for an object is constituted of only 96-bits (indicating company name, object type/class and
serial number) allowing relative low data transfer between tag and reader. [9]
Nowadays, low-cost radio frequency identification (RFID) has been attracting more and more
interests from both industry and academic institutes [26]. It has gained wide range adaptation
for low-cost and ubiquitous computing applications, such as location tracking, access control
and environmental conditions monitoring. An RFID system consists of three parts: radio
frequency (RF) tags, RF tag readers and the back-end database that associates records with
tag data collected by readers. Tags are composed of a microchip for memory and logical
operations, and an antenna coil for receiving and transmitting wireless signals. Readers
interrogate tags for their contents through RF antenna and interface to back-end databases for
aims at reducing supply chain inefficiencies and improved inventory flow whilst considering
the returns process. RFID based supply chain management achieves has many beneficial
features over traditionally used bar code. 1) It doesn’t require line-of-sight access to read. 2)
The reading range of RFID is larger than bar code, though it’s still short range. 3) Tags can
be read simultaneously. Inventory can be obtained in a very short time without line of sight at
the entrance, because multiple tags can be read at the same time. 4) Tags can store more data,
such as the unique ID for a certain good and data from the readers and the environment.
Hence they can be tracked from producers to distributors and to retailers. The beneficial
features greatly improve supply chain management efficiency and ease of use. However, they
expose RFID based supply chain to security and privacy challenges. A secure RFID system
has to avoid eavesdropping, traffic analysis, spoofing and denial of service, as it has large
read range and no line of sight requirement. In contrast, security and privacy is not a problem
for barcode, as the reading range of barcode is as short as several centimeters. An important
security concern is that a store’s inventory labeled with unprotected tags may be monitored
31
by competitors’ unauthorized readers. The inventory data holds significant financial value for
commercial organization and their competitors. Another privacy concern is that individuals
may be tracked through RFID tags labeled on the carried objects. Even if the tags only
contain product codes rather than unique serial number, someone’s tastes in brands
“constellation” will also betray their identity. Moreover, even if the responses of tags are
encrypted, the owner can also be identified and tracked by the fixed encrypted code.
are unable to give quality time to each patient. The present health sector status is manual as
the doctor itself or staff members check the bp and temperature of the patient and there is’nt
continuous monitoring of the patients. As the basic checkup is manual so the patient waits for
the checkup until the doctor or staff member comes and checks it. And then the staff person
gets the temperature and bp results to the doctor. There is no special facilities for the person
that is paralyzed (partially or fully). So the paralyzed person is unable to convey his message
i. Improvement Needed:
The things that need to be changed or upgraded in the ward is that it’s management is needed
to be upgraded. The current system is manual as explained earlier, basic checkup and
patient’s health condition. Also for paralyzed patients , a facility should be provided so he
identification will be provided to the patients and after identification he himself can check his
temperature and pulse through its sensors. And for partially paralyzed patients, a hand motion
32
recognition circuit will be provided to the patient so that he can send his messages to his love
one. Also continuous monitoring will be provided to the patients in the ward.
temperature by the infrared radiation in the form of an electromagnetic wave through the light
emitted on the object [14]. MLX90614 is a powerful infrared sensing device with a very low
noise amplifier with a 17 bit ADC. It utilizes non-contact temperature sensing to collect the
temperature info without touching any surface of the object. It enables to obtain the
measurement of high accuracy and resolution. It was calibrated with a digital System
Management Bus (SMBus) from the factory in wide temperature ranges: -40 °C to 125 °C for
the ambient temperature and -70 °C to 380 °C for the object temperature with being standard
temperature range around the human body temperature has been offered to a special version
Body temperature
33
High fever: 103o F (39.5oC) and higher.
by students, artists, athletes, makers, and game & mobile developers who want to easily
incorporate live heartrate data into their projects. The sensor clips onto a fingertip or earlobe
and plugs right into Arduino with some jumper cables. It also includes an open-source
Heart rate is measured by using two numbers. The first number is called systolic heart rate
which measures the pressure in our blood vessels when your heart beats. The second number
is called diastolic heart rate which measures the pressure in your blood vessels when your
heart rests between beats. If the measurement reads 120 systolic and 80 diastolic, you would
say "120/80 mmHg."A heart rate less than 120/80 mmHg is normal. A heart rate of 140/90
mmHg or more is too high. People with levels in between 120/80 and 140/90 have a
condition called prehypertension, which means they are at high risk for high heart rate. The
output of the heart beat sensing by heart beat sensor measured in beats per minute (BPM).It
will measure the pulse in every minute and displayed it on the android.[27]
34
mmHg.
for information into a valid issue, and enhancement of global control using specific detectors.
Networks, as well as their validity to use wireless sensors, need to fix many critical
challenges. Real-time monitoring systems produce a large amount of data that can cause
network overhead, mainly when limited bandwidth is available. Mechanisms for error
detection must be introduced to provide a program that can deal with that.
A significant key aspect in introducing intelligent functions into real-world systems seems to
be the shortage of reliability, the incapability to evaluate and justify these structures in
The security or surveillance system has become a need for the houses and apartments, as well
as other famous places, in today's life. There are several methods which are used for
monitoring a system, but today's world requires the smart system. The Internet of Things
(IoT) is the new technologies through which we use web buses and intelligent phone systems
building application targeting the Microsoft platform but it can also be used to build
35
applications using C++, Python and so on. In short it will be an IDE for every developer who
Arduino IDE will help you to save time and effort for all the tasks that you want to do with
your code, be it code navigation refactoring, code fixes, debugging, intelligence or unit
testing of your module.Not only from the code perspective, but it will also streamline your
real time architectural dependency validation and provide stronger support for the integration
of the source code repositories, such as TFS (team foundation Server) or Git.
It comes with the brand new light weight installation experience that modularizes that need to
improve your efficiency of the fundamental task with a faster IDE access to a new way of
Not only the common code editing features, but visual studio also comes with Xamarin,
which will help you build mobile applications for android, IOS and windows, more quickly
and easily than ever. You can also choose the path to build the mobile apps with visual C++
We will cover the new installation experience as well as the new features and enhancements
that Microsoft has added to visual studio. The following are the topics that we will discuss in
this chapter:
36
Uninstalling Visual Studio Installation and signing into visual studio.
Editor Config.
infrared temperature sensors have been used for numerous applications in diverse research
fields. Various IoT architectures for indoor monitoring that incorporates open-source
technologies for processing and data transmission and micro sensors for data acquisition but
37
also allows access to data collected from different places simultaneously through Web access
A thermometer that uses infrared sensors to detect temperature without contact is designed is
collect human or object temperature and an LCD to display and alarm when over-
temperature. This system must be placed in the forehead for a few seconds to get the body
temperature, to alarm once the set value is exceeded. A real-time human body surface non-
contact temperature monitoring system for optical rehabilitation therapy has been proposed
by [31]. The system error is less than 0.2 and the response time is less than 0.1s considering
0-60cm distance range. A non-contact liquid security identification system has been
MLX90614 sensor and an STM32F107 microprocessor. The authors claim that the system
meets the requirements of high reliability, low-cost, low power consumption, real-time
response and the demands of the non-contact liquid security identification system. A study on
the potential of infrared thermometry and thermal imaging for monitoring plant water stress
in a commercial sugar beet field by comparing canopy temperature data acquired from a
mounted on a rotary-wing unmanned aerial vehicle (UAV) was conducted by [33] . Results
indicated that the lightweight canopy temperature system was robust and reliable. In
conclusion, several applications using infrared temperature sensors has been done in the past,
38
39