毕业设计文献翻译.doc_第1页
毕业设计文献翻译.doc_第2页
毕业设计文献翻译.doc_第3页
毕业设计文献翻译.doc_第4页
毕业设计文献翻译.doc_第5页
已阅读5页,还剩15页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

2013届本科毕业设计(论文)外文文献翻译学 院: 物理与电子工程学院 专 业: 电子信息工程 姓 名: 顾海峰 学 号: 160409214 (用外文写) 外文出处:Proceedings of the Eighth International Conference on Machine Learning and Cybernetics,Baoding,12-5 July 2009附 件: 1.外文资料翻译译文;2.外文原文.当前无线射频识别技术应用略述1、 简 介 无线射频识别(RFID)是一种识别技术。与RFID技术的前身条码技术相比,RFID技术具有很多的优点。但由于其成本高,RFID技术至今未能广泛应用到各行各业。RFID技术因其无需视线扫描而具有无可比拟的先进性,它能够降低劳动力水平,提高知名度并改善库存管理。 RFID技术的普及提供了一项人或物体定位及追踪的解决方案。RFID定位与跟踪系统根据独特的识别标签、阅读器与物体标签间射频通信的信号强度确定物体的空间位置,主要适用于室内,而GPS系统是不适合应用于室内的。 RFID技术是一项基于“无线电频率”的非接触式的自动识别技术,自动识别静态或动态的人和对象。 RFID标签是一个特殊的微芯片,植入商品中,可以跟踪和管理物理对象,是物流管理信息化和跟踪信息化的重要手段。RFID的系统组成部分包括: (1)标签(应答器):对象植入待确定。 (2)阅读器:可以读或读/写,按结构和技术。正如图1-1,RFID的工作原理与计算机通讯阅读器电磁波(操作指令和新的数据)标 签发出的ID代码和数据 图1-1 RFID的工作原理二、目前RFID技术的研究重点 由于RFID技术日趋成熟且RFID标签价格下降,RFID越来越受到工业界和学术界的关注。通过在物品上贴射频标签,我们就可以跟踪和管理这些对象。这项技术会逐渐取代目前的广泛采用的条码系统。(一)RFID标签与条码 条码技术广泛采用于商品和对象的识别。我们能够在超市的任何包装产品上找到条码。Zebra公司是领先的条码供应商之一,它为全世界超过一百个国家提供专业数码印刷及自动识别解决方案。二十年前,该公司主要生产标准标签。如今,Zebra 开展RFID业务。从应用角度来看,尤其是在零售业方面,条码和RFID有着相似的市场应用点。RFID技术会取代条码吗?从概念的角度来看,RFID标签和条码标签也有相似之处。通过提供一种易于识别的取货码,管理便利店商品。两者之间的主要差别是条码技术采用只读方式且必须在阅读器规定的线路上读取。与条码相比,RFID通过无线电传输数据且能够改变存储在RFID标签上的数据。这种远距离的非接触式自动化操作有效减少人力需求。RFID最先进的一点是它可以在同类型的产品中识别个别物品。RFID为供应链所有进程中单一商品提供实时跟踪环境。基于这些功能,RFID技术减少了仓储,配送和库存成本。这直接为企业带来更多的利润,显著提高客户服务质量。(二)射频标准的发展 企业逐渐认识到RFID 产品和服务创造的巨大商机。RFID技术主要在美国,日本,韩国和中国发展。美国食品和药品管理局国际部已经开始推动RFID技术的发展,沃尔玛就是一个成功的例子。沃尔玛用RFID产品取代条码节省67亿美元,6亿美元存储成本及5.7亿美元丢失盗窃成本。然而,RFID技术还没有一个单一的全球标准。美国正在建立本国的RFID硬件和应用标准,欧洲标准主要遵循美国的标准。 日本在智能通信和家电领域有深入的研究。日本提出的UID标准目前只应用于本土。日本经济贸易和产业部(METI)正在推动RFID在日本的发展和应用。日本经济贸易产业部的两个主要任务是降低RFID标签成本、促进日本标准全球化。韩国的研究和开发集中在自动化和智能家电方面。 中国政府也意识到了RFID产业价值,并制定自己的RFID 标准。中国因其大规模宽领域的工业而被称为“世界工厂”。因此,中国有潜力发展自己的标准。虽然与上述国家相比中国的RFID行业起步较晚,但其成长迅速,正逐渐成为全球极具竞争力的国家。一些公司如Invengo,正在开发其自主品牌的RFID产品。(三)目前射频技术的发展硬件组件对于所有RFID系统而言是共同的,而不同的软件形成不同的RFID应用。硬件方面的主要问题包括:产品小型化、降低成本、大制作等。一些公司如德国西门子,加快RFID芯片的发展,快速丰富自己的产品以满足用户的需求。目前超高频RFID芯片的集成度已大大增加。 第二代(Gen.2)RFID标签很快取代上一代,并在应用市场占主导份额。富士通首次开发的64 KB内存RFID标签访问速度高、存储量大,已经成功应用于航空业。阅读器的价格不断递减,RFID读取器的功能不断加强而价格却不断递减。最近一年,微软发布了BizTalk Server,这种服务器将RFID技术与微软的产品应用集成。由于RFID系统成为日常生活的重要部分,敏感且私人信息都可能存储在RFID 标签中。这一安全威胁变得越来越严重,限制了RFID技术的推动和发展。由于RFID标签成本和空间的限制,RFID技术通常不具备高功率的安全机制。RFID标签是易受攻击的。如果没有适当的安全措施,任何人都可以用RFID读写装置阅读、修改和删除一个RFID标签上的数据。而且RFID标签很容易复制,这对门禁系统而言是一大威胁。现在,一些安全措施可供应用方面使用。例如,ISO为数据认证颁布的15693标准已经应用于银行卡授权和建设门禁系统。然而,所有的安全措施都有一些缺点,它已成为关于RFID技术的热门研究话题。3、 射频技术的主要应用 RFID技术的应用主要集中在物流、零售业、收费系统、机票、医疗保健,安全和识别系统。 (一)物流 其中最著名的RFID技术的应用之一是供应链管理。RFID标签附在商品上。RFID阅读器跟踪供应链中的物品或零件及所有的物品从产地到销售点。Megatrux是世界100强物流公司之一,其将摩托罗拉公司的RFID计划应用到供应链管理。他们的客户服务得到改善,而成本却大大降低。 RFID技术在产品交付方面很有价值。我们利用贴在物品上的RFID标签跟踪产品从拣货到提交的移交过程和当前位置。RFID技术能够缓解人为失误造成的错误交货,并不要求像条码一样一对一的视线阅读。 在识别大批量的货物时,减少了时间并节约阅读标签成本。在2005年,澳大利亚邮政开始在国内邮政服务范围内处理RFID标签信封。联邦快递开始测试RFID技术的应用,用其跟踪包裹的温度、位置、湿度水平和交货状态。在服装行业,RFID技术应用于生产、分销和零售。RFID系统可以提供库存可视性,加强顾客购物体验。该系统能够知道哪些衣服客户挑选的频率最高,并根据标签提供服装定制广告。美国服饰在其旗下的八个商店运用RFID系统。该系统每周节省劳动力约60-80小时。日本服装制造商Sankei 在制造过程利用RFID系统跟踪服装并促进网上销售。 (二)零售业在零售行业,RFID技术通常用于收集客户数据。通过跟踪这些数据,用户可以获得关于产品库存的实时信息。进一步利用数据能够提供更多有用的信息并协助决策。例如,在一家超市,当顾客进入超市时,给每位顾客提供一个互动装置。他们可以利用该装置输入个人信息(年龄、性别、职业等)并拟定购物清单。然后,该设备向顾客返回建议购物路线、相关产品和折扣信息。当顾客就近选取商品或向自己的购物车放入商品时,先前部署的RFID阅读器将汇总这些变化。随后,应用软件将分析这些资料,向顾客发送新的建议。数据挖掘和其他器械学习技巧能够发现隐藏的顾客行为、购物习惯、商品与青睐物品之间的关联。四、安全RFID标签预计增产到数十亿,这就引起了对隐私和安全的关注。常见的问题便是隐私的泄露,企业扫描标签以获取有关客户的信息,然后利用数据挖掘技术创建个人配置文件。该节将描述在可能的情况下被利用的RFID电子标签,击败那些存在威胁或者至少使它们很难执行的机制。之后的部分关注的是针对RFID系统的攻击。随着RFID技术的日趋复杂化,项目级标签在企业内标签项目其生产过程的供应链管理上具有更强的控制力和节省力。为了利益最大化,企业开始要求该公司的所有项目都有标签。例如,沃尔玛、宝洁和美国国防部要求其供应品都有项目级标签。然而,产品不是唯一的实体标签。动物标签在大型农场相当普遍以跟踪其移动的“财产”。此外,人类标记开始出现。在西班牙巴哈海滩俱乐部,VIP会员可以植入标签用它来支付他们在该俱乐部的饮品。这个植入的标签是Very Chip。反RFID活动家创建了几个方案,以显示若没有采取预防措施而受到的可能攻击。最常见的一种是以创建用户配置文件,扫描未经授权的标签。例如扫描一个进行治疗的疑似病人而受到的影响,或扫描一大群人而选出一个人携带了许多贵重物品(甚至金钱,如果有建议标签)。如果标签代替信用卡而造成窃听,也成为一个问题,则必须加以解决。上述问题是隐私问题,但并不是唯一的问题。认证也是必要的。例如,新的标签有可擦写内存,可存储在生产过程中的额外信息。例如,如果商店依此类资料来确定销售价格,必须小心客户根据便携式阅读器而更换商品类型以求便宜。此外kill命令必须受到保护,这是一个永久禁用性标签的机制,以求免遭未经授权的访问。最近的一份文件声称在RFID社会化中,手机应重新编程,以禁用HF标签。如果标签中记录了个人信息(如读者病史,信用卡号码),那么阅读器必须在访问数据之前进行身份验证和授权。在前面的例子中,阅读器必须验证标签,也有标签来验证阅读器的情况,例如检测伪造的标签。禁用命令:该命令由EPC1级和2标签支持。一旦我们收到标签,该命令将感染标签使它无法使用。为了防止对方调用这些命令,它有密码保护:EPC 1级标签有八位密码和EPC二级标签有32位密码。一篇理论性文章介绍了一部手机, 它扫描标签时,一旦发现可快速找出所有可能的密码就进行固件更新以重组软件。在Oren06中介绍了更明智的方法,通过使用功率分析反向散射信号来找到的禁用命令密码。因为反向散射的信号强度而功率分析工作取决于标签芯片通道的电量,该通道又取决于它的数量和计算类型。较新的芯片尝试设计一种电路,使这种功率分析变得不可能。睡眠命令:一个标签不能总被消除。消除一个图书馆的书的标签,这本书在归还后又需要重新标签,这就没有达到目的。但是图书馆的隐私权应受到保护。消除命令与睡眠命令很相似。一旦收到可接受的唯一密码保护命令,它将被激活。睡眠命令也与消除命令存在相同的问题。重新标记:Inoue03中描述了一个方法,使得用户可以根据其选择的字符串来标记标签。然而有些旧信息仍处于密码保护的区域。该想法是要当产品被丢弃时使保护信息仍可用,回收厂可通过这些信息进行分类。分离法:该方法使信息分布在两个标签中,其中一个标签是对用户来说是可移动的(比如说衣服上的纸签)。固定标签一般只是存储的产品信息有类型、保健信息等而移动标签则包含序号。此方法以其独特的标识符达到项目跟踪,也允许客户追踪自己的物品。代理法:Rieback05介绍了RFID的门卫。它假设所有的标签可以由用户自己设置的PIN码来保护。一旦一件物品有了门卫,那么就有了新的PIN码。如果另一个阅读器想获得的存储在标签上的信息,那么阅读器就要从门卫上标记检索信息。如果阅读器允许的话就可将该信息转发。距离法:Fishkin04中描述的是标签使用信噪比得到一个粗略估计的阅读器距离。阅读器的距离越近,就会出现更多的信息。在扫描一个远处的物品将会反馈一般信息,例如“我是一件长袖棉毛衫”的中长度范围扫描可反馈为“我是一件某品牌的蓝色衬衫”,最后近距离的扫描将显示序号。该方案的优点是不需要客户的活动,还能获得同样好处。然而,这些标签可能要更贵一些。阻塞法:下面介绍的是一个相当拙劣的方法:这是一个没有遵循介质存取协定的特殊标签。RFID电子标签使用的是一个特殊的协议,它实现的访问是共享介质(空气)的控制。当在一个区域上有多个标签的阅读器首次发现在其范围内的所有标签后就调查每个标签。特殊标签有抑制反散射随机信号的机制,切实干扰使用频率。本文给的实例类似于以下:超市购买的物品在收款台处扫描时,然后在塑料袋里放入拦截器标签。而这个袋子在拿回家时就没有人能扫描出袋子中的东西。到家里时将物品从袋子中拿走放到冰箱里,冰箱就扫描这些物品并将其添加到库存。标签的该项功能也可以推广到手机,例如创建围绕其载体的安全泡沫。五、结束语 RFID技术具有很多优点,如以高精度、非接触的方式同步采集大量数据等。RFID技术对我们的生活影响越来越大,逐渐取代超市和物流管理中的条码。目前,射频技术最广泛的应用是的访问控制和货物位置追踪。实际上,RFID技术提供个体物品识别和在线多变数据存储的功能。对于这些附加功能,我们要创造一个更好的工具。因此,我们期待新一代的RFID应用纳入智能化。智能化的RFID应用可能带来新的研究和商业机会。此外,它有助于进一步降低成本、提高客户服务,并提供商业模式更新的洞察力。六、参考文献1 Kuo shien Huang and Shun ruing Tang,RFID Application Strategy and Deployment in Bike Renting System,International Conference on Advanced Communication Technology,PP.660-663,Feb,2008 2 Landt J.The history of RFID,Potentials,Vol 24,No.4,PP8.11,Nov.23 Michael K.and MeCathie L.,The Pros and Cons of RFID in Supply Chain ManagementInternational Conference on Mobile Business,PP623629,July 20054 Allen Nogee, Tags and Chip:Changing the World for Less Then The Pricc of A Cup Of Coffee,In-Stat /MDE,PP14,December,20045 6 Christine Gallen,Total RFID Revenue to Exceed$5.6 Billion in 2009,According to ABI research, /press/1395附件2:外文原文1. Introduction Radio frequency identification (RFID) is a new identification technology. RFID has a greater number of benefits than its predecessor, the bar code. It is not universally adopted in many industries due to its high cost hitherto. However, RFID is unmatched advanced because it does not require sight scanning, it acts to reduce labor levels, enhances visibility, and improves inventory management. The popularization of RFID (Radio Frequency Identification) provides a solution of the location/ tracing of human or objects. RFID location and tracing system,measures the space location of object based on unique identification tag and signal intensity of RF communication between reader and tag in object, mainly apply to indoor location, which GPS system is not suitable for . RFID, a non-contact automatic identification technology based on “Radio Frequency”, automatically identify static/moving object/human. RFID tag, a special microchip, implanted in commodity, can trace and manage physical object, is an important means of logistics management informatization and tracing informatization . The component of RFID system including: (1) Tag (transponder): implanted in object to be identified. (2) Reader: can read or write/read, according to the structure and technology. As figure 1, RFID work principle.Communicate with computer ReadereElectromagnetic wave (operation instruction and new data) TagEmit ID code and data Figure 1-1,RFID work principle2. Current Research Focuses of RFID With the growing maturity of RFID technology and the drop in price of RFID tags,RFID attracts increasing interests from both industry and academic.By attaching RFID tags on objects,one could keep track on and manage those objects.This technology gradually replaces current widely adopted barcode systems2. 1.RFID Tag and Bar code Bar code is widely adopted for goods and object identification.One could find bar code on every packaged item in supermarkets. Zebra Company is one of the leading bar code providers and provides on-demand specialty digital printing and automatic identification solutions in more than 100 countries around the world.About twenty years ago, the company mainly produced the standard labels. Now Zebra also moves to RFID business.From the application point of view, bar code and RFID share a similar market, especially in retail aspect. Will RFID replace bar code?From conceptual point of view, RFID tag and bar code are also similar.Both of them target to facilitate goods management by providing an easy to fetch identification code.There are two major differences between them,barcode is read-only and must be in line-of-sight from the reader .Comparing with bar code.RFID is able to transmit data by radio frequency and alter data stored on the RFID tag chip.This long range and non-contact operation allows automation to reduce man power requirement.The most important advancement of RFID over barcode is that it allows identification of individual item from a group of same type products.RFID also provides real-time traceability environment for individual item through all process in the supply chainOwing to these features, RFID reduces the cost for warehouse, distribution and inventory.This directly brings more profit to companies and improves customer service remarkably 2.2. Development of RFID Standard Enterprises gradually realize the great business opportunities created by RFID products and services.Major developments of RFID technologies are located at USA,Japan,Korea and China.For examples, Wal-Mart,the international department of the United States,the United States Food and Drug Administration have promoted the development of RFID.A successful example is Wal-Mart.They replaced some barcodes by RFID products which saved US$6.7 billion barcode cost,US$0.6 billion storage cost and US$0.57 billion missing and theft cost.However, RFID does not have a single global standard yetUSA is developing its RFID standard for both hardware and application areas.The RFID standard of European mainly follows the USA standard. Japan has strong research and product lines on intelligent communication and home appliances.Japanese proposed the UID standard which is adopted in Japan homeland only.Japanese Ministry of Economy ,Trade and Industry(METI) is pushing for the development and applications of RFID in Japan.The two major missions of METI are to reduce the cost of RFID tags and to promote the Japanese standard to worldwide.Korea focuses their RFID research and development on automation and home appliances intelligent. The China government also realizes the industrial value of RFID and is formulating its own RFID standard.China is considered as the “world factory” because of its large scale and wide range of industry. Therefore, China has the potential to develop its own standard. In comparison to aforementioned countries, although China is late in starting its RFID industry, it grows up rapidly and is gradually becoming very competitive in worldwide. Several companies,e.g. Invengo,in China are making progress on the development of their own brands of RFID products2.3.Current RFID Technology Development Hardware components are common to all RFID applications while different software leads to different RFID application, Major issues in RFID hardware include product miniaturization,cost reduction, large production,etcSome companies,such as German Siemens, speeded up the development of RFID chips to enrich their products and to meet users needs.The integration density of current UHF RFID chips has been greatly increased.The new Generation 2(Gen.2) RFID tags quickly replace old generation tags and have a dominant share on the RFID application market. Fujitsu developed the first RFID tag with 64 KB memory which has been successfully adopted in aviation industry owing to its high access speed and large storage.The price of RFID readers are monotonically decreasing while the capacities of RFID readers are enhancing, in recent year, Microsoft issued the BizTalk Server which integrates the RFID with Microsoft product application.As RFID systems becoming an important part of everyday life, sensitive and private information may be stored in RFID tag. This security threat becomes more serious and puts a severe limitation to the promotion and deployment of RFID applications.However, owing to the limitation of space and cost of a RFID tag, RFID tag usually does not equip with high power security mechanism.RFID tags are frangible to attack .Without appropriate security , anyone could read,alter and delete data on the RFID tags with a RFID reader/writer.Moreover, RFID tags are easy to clone. This is a big threat to access control system.Now,a number of security measures are available for applications.For example.The ISO standard 15693 for data authentication is adopted in bank card authorizations and building access control systems.However,all security measures have some shortcoming and it has become a hot research topic in RFID3.Major RFID Applications RFID applications focus on logistic,toll system,ticket, healthcare,security and identification systems.3.1 Logistic One of the most famous RFID applications is supply chain management. RFID tags are attached to goods. Items or parts in the supply chain and all items are tracked by RFID readers from manufacture to point of sales. Megatrux ,a top l00 logistics company in the world, has applied Motorola RFID plan to its supply chain management. Their customer services have been improved while the costs have been reduced greatly RFID also has a great value in product delivery. We could track the handing process and current location of the product from pick up to delivery with RFID tag attached on it. It helps to relieve incorrect delivery owing to human mistakes. It does not require one to one line of sight reading which is required for barcode. This reduce the time and cost of reading tags for a large batch of goods.The Australia Post begun processing RFID-tagged envelops in domestic mail service in 2005.Federal Express runs a pilot test on the application of RFID technology to track packages temperature,location,humidity levels and delivery status.In apparel industry ,RFID is applied in manufacturing, distribution and retailRFID system provides inventory visibility and enhances customer shopping experienceThe RFID system is able to know which clothes being picked up by customers most frequently and to provide customized advertisement on picked clothes according to the RFID tags.American Apparel applied RFID system to eight of their storesit helps to save about 60-80 hours per week in labor .Japanese apparel manufacturer Sankei utilizes a RFID system in clothing manufacturing to track clothes during the manufacturing process and facilitate online sales.3.2 RetailIn retail industry, RFID are usually used to collect customer data.By tracking those data, one may have a real time visibility on the stocks of products. However, the data could be further utilized to provide more useful information and assist in decision making.For example,in a supermarket,every customer is given an interaction device when entering the supermarket.With the device,they can input personal information(age, gender, occupation, etc) and intended shopping list.Then,the device returns the customer a suggested shopping route,advertisement on related products and discount information.RFID readers deployed will collect those changes when the customers get close to a selected shelf or put some goods in their shopping carts. The application software will then analyze the information to make new suggestions to customers.Data collected for a day could be studied to enhance the validity of suggestion and provide better customer services. Data mining and other machine learning techniques could also be adopted to discover hidden customer behaviors,shopping habits ,association rules among products and favored items4. SecurityThe expected proliferation of RFID tags into the billions has raised many privacy and security concerns. A common concern is the loss of privacy when companies scan tags to acquire information about customers and then using data mining techniques to create individual profiles. This section describes possible scenarios where RFID tags can be exploited. Then it describes what mechanisms exist to defeat those threats or at least make them harder to execute. After that the section concentrates on attacks that are directed against RFID systems.As RFID technology becomes more sophisticated and item level tagging promises more control and large savings in the supply chain management, companies are tagging items within their production process. To maximize the benefits companies start to require their suppliers to label all items delivered to the company. For example, Wal-Mart, Proctor & Gamble, and the US Department of Defense require their suppliers to phase in item-level tagging. However, products are not the only entity tagged. Animal tagging is quite common at large farms to keep track of their moving property. Also, tagging of humans started to appear. In the Spanish Baja Beach Club, VIP members can get an implant that they can use to pay for their drinks in the club. The implanted tag is a Very Chip.Anti-RFID activists created a few

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论