eCloudRFID - A mobile software framework architecture for pervasive RFID-based applications
نویسندگان
چکیده
In the last few years, RFID technology has become a stimulating and rapidly expanding area of research and development. The technology’s ability to precisely identify objects at low cost and without line of sight creates new and emerging opportunities for RFID applications that could become an integral part of our daily lives. Mobile RFID services for the Internet of Things can be created using RFID as an enabling technology in mobile devices. This pervasiveness enables embedded systems to interact with the user continuously, providing data from their sensors and responding to requests from the users too. Humans, devices and things are both the content providers and users of these mobile services. Mobile RFID services can be either provided on mobile devices applications as stand-alone services or combined with legacy and end-to-end systems. However, to develop and deploy this kind of system, it is necessary for an effective software development infrastructure to be able to deal with the restrictions and limitations imposed by related business areas, RFID and pervasive applications. This work presents a software framework architecture for mobile devices that aims to facilitate the development process of embedded RFID applications and the integration process of business applications and EPC Network instances. The framework provides for applications a common communication interface to abstract different devices and reading protocols as well as functions to process and distribute data. & 2010 Elsevier Ltd. All rights reserved.
منابع مشابه
U-healthcare Enterprise Frameworks for Mobile Applications
The advances in mobile devices, frameworks and u-computing have given rise to a vast range of new services for RFID (Radio Frequency Identification) technology. In this paper, we propose a U-healthcare Enterprise Application Framework for interchanging the information on mobile devices in the RFID-based distributed computing environment. We describe the requirements of u-healthcare Enterprise A...
متن کاملRemote control for pervasive services
In this paper, we present the REACHeS architecture for controlling pervasive services through physical user interfaces, using a mobile terminal and icons placed in the environment. An icon advertises a service that can be started by touching the icon with a mobile terminal. This service activation configures the mobile terminal as a remote control for the service. We have implemented this archi...
متن کاملA temporal RFID data model for querying physical objects
RFID holds the promise of real-time identifying, locating, tracking and monitoring physical objects without line of sight, and can be used for a wide range of pervasive computing applications. To achieve these goals, RFID data have to be collected, transformed and expressively modeled as their virtual counterparts in the virtual world. RFID data, however, have their own unique characteristics –...
متن کاملMobile Business Through RFID Technology: About The Potential Of RFID Technology For Distributing Free And Paid Content On Mobile Devices In Retail Business
The attention on Radio Frequency Identification (RFID), Mobile Business and Mobile Content has recently attracted in various industry sectors, the media and in academic research. This article focuses on the convergence of RFID technologies and mobile devices and presents applications in the retail business. Based on related literature and existing models and technologies, a business framework a...
متن کاملSoftware abstractions for mobile RFID-enabled applications
Our everyday environments may soon be pervaded with radio frequency identification (RFID) tags integrated in physical objects. These RFID tags can store a digital representation of the physical object and transmit it wirelessly to pervasive, context-aware applications running on mobile devices. However, communicating with RFID tags is prone to many failures inherent to the technology. This hind...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Network and Computer Applications
دوره 34 شماره
صفحات -
تاریخ انتشار 2011