A Study on Pig Slaughter Traceability Solution Based on RFID

نویسندگان

  • Qingyao Luo
  • Benhai Xiong
  • Zhi Geng
  • Liang Yang
  • Jiayi Pan
چکیده

Due to an assembly line production and poor environment conditions in pig slaughterhouses, collection of slaughter tracing information is not a simple thing. Based on the UHF radio frequency identification (RFID) technologies, this study designed a RFID tag for carcass, a RS232-PS2 data conversion line and some data norms such as the RFID carcass tag and partition meat label norm, and developed online reading and writing system for RFID tags, accomplished RFID identification for carcass and automatic identification on the slaughter line. Through identifying ear tags at the pig heading process, fixing RFID carcass tags at the half-carcass process, printing partition labels at pork exclusive stores, the study were able not only to collect, transmit and deal traceability information for pig slaughter in the key processes of the whole pig slaughter line, but also print a set of commercial cutting meat tags of 1D bar code based RFID carcass tag in the sales store. This study has been applied for demonstration in Tianjin and explored any possibility for application of RFID technology in pork quality traceability system from both technology and application links.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Traceability improvements of a new RFID protocol based on EPC C1 G2

Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

Modeling and Implementation of Cattle/Beef Supply Chain Traceability Using a Distributed RFID-Based Framework in China

In recent years, traceability systems have been developed as effective tools for improving the transparency of supply chains, thereby guaranteeing the quality and safety of food products. In this study, we proposed a cattle/beef supply chain traceability model and a traceability system based on radio frequency identification (RFID) technology and the EPCglobal network. First of all, the transfo...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

Use of RFID Technology for Identification, Traceability Monitoring and the Checking of Product Authenticity

This paper is an overview of the structure of Radio Frequency Identification (RFID) systems and radio frequency bands used by RFID technology. It also presents a solution based on the application of RFID for brand authentication, traceability and tracking, by implementing a production management system and extending its use to traders. Keywords—Radio Frequency Identification, Tag, Tag reader, T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010