A Distributed Visual Surveillance System
AVSS '03 Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance
An Approach to Security and Privacy of RFID System for Supply Chain
CEC-EAST '04 Proceedings of the E-Commerce Technology for Dynamic E-Business, IEEE International Conference
RFID: A Technical Overview and Its Application to the Enterprise
IT Professional
RFID Implementation
RFID: A Guide to Radio Frequency Identification
RFID: A Guide to Radio Frequency Identification
The RF in RFID: Passive UHF RFID in Practice
The RF in RFID: Passive UHF RFID in Practice
Area surveillance using RFID system
EHAC'10 Proceedings of the 9th WSEAS international conference on Electronics, hardware, wireless and optical communications
Hi-index | 0.00 |
Monitoring and tracking the activities of individuals (or objects) in multiple zones or areas simultaneously is quite a challenging task. It is a very common practice to use observation cameras or to have security personnel to guard the specified areas. However, area surveillances using these common methods may become tedious when the activities to watch out for increases. More cameras as well as manpower are needed to cater for the increment of activities for each zone. On top of that, should anyone (or objects) vacates or trespasses the designated areas, it would take some time to identify them, hence resulting complexity in tracing their whereabouts. To overcome these challenges, we propose a surveillance system for multiple zones using RFID technology. Individuals or objects to be monitored are tagged using RFID tags that hold unique identification. Each zone is allocated with one RFID reader, which will transmit the information of activities of the respective zones to the host computer in the control room. The security personnel in the control room would be able to identify which individual or objects that are out of their designated zones or trespassing to another zone based on the tags that has been detected by the reader. Should the tags are removed without authorization, alarm will be generated. Every activity transactions are recorded in a database for future references or actions. A case study of inmate tracking system is conducted and demonstrated to prove the capability of the proposed method.