17,421 research outputs found
Leveraging RFID in hospitals: patient life cycle and mobility perspectives
The application of Radio Frequency Identification (RFID) to patient care in hospitals and healthcare facilities has only just begun to be accepted. This article develops a set of frameworks based on patient life cycle and time-and-motion perspectives for how RFID can be leveraged atop existing information systems to offer many benefits for patient care and hospital operations.
It examines how patients are processed from admission to discharge, and considers where RFID can be applied. From a time-and-motion perspective, it shows how hospitals can apply RFID in three ways: fixed RFID readers interrogate mobile objects; mobile, handheld readers interrogate fixed objects; and mobile, handheld readers interrogate mobile objects.
Implemented properly, RFID can significantly aid the medical staff in performing their duties. It can greatly reduce the need for manual entry of records, increase security for both patient and hospital, and reduce errors in administering medication. Hospitals are likely to encounter challenges, however, when integrating the technology into their day-to-day operations. What we present here can help hospital administrators determine where RFID can be deployed to add the most value
A survey on subjecting electronic product code and non-ID objects to IP identification
Over the last decade, both research on the Internet of Things (IoT) and
real-world IoT applications have grown exponentially. The IoT provides us with
smarter cities, intelligent homes, and generally more comfortable lives.
However, the introduction of these devices has led to several new challenges
that must be addressed. One of the critical challenges facing interacting with
IoT devices is to address billions of devices (things) around the world,
including computers, tablets, smartphones, wearable devices, sensors, and
embedded computers, and so on. This article provides a survey on subjecting
Electronic Product Code and non-ID objects to IP identification for IoT
devices, including their advantages and disadvantages thereof. Different
metrics are here proposed and used for evaluating these methods. In particular,
the main methods are evaluated in terms of their: (i) computational overhead,
(ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether
applicable to already ID-based objects and presented in tabular format.
Finally, the article proves that this field of research will still be ongoing,
but any new technique must favorably offer the mentioned five evaluative
parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports,
Wiley, 2020 (Open Access
When Things Matter: A Data-Centric View of the Internet of Things
With the recent advances in radio-frequency identification (RFID), low-cost
wireless sensor devices, and Web technologies, the Internet of Things (IoT)
approach has gained momentum in connecting everyday objects to the Internet and
facilitating machine-to-human and machine-to-machine communication with the
physical world. While IoT offers the capability to connect and integrate both
digital and physical entities, enabling a whole new class of applications and
services, several significant challenges need to be addressed before these
applications and services can be fully realized. A fundamental challenge
centers around managing IoT data, typically produced in dynamic and volatile
environments, which is not only extremely large in scale and volume, but also
noisy, and continuous. This article surveys the main techniques and
state-of-the-art research efforts in IoT from data-centric perspectives,
including data stream processing, data storage models, complex event
processing, and searching in IoT. Open research issues for IoT data management
are also discussed
- …