2. International Conference on Systemics, Cybernetics and Informatics
This system ultimately became one of the first building entry The RF tags could be divided in two major groups:
systems based on the first commercial use of RFID. Passive, where the power to energize the tag’s circuitry is
RFID or Radio Frequency identification is a technology that draw from the reader generated field.
enables the tracking or identification of objects using IC based Active, in this case the tag has an internal power source, in
tags with an RF circuit and antenna, and RF readers that general a battery that could be replaceable or not, in some case
"read" and in some case modify the information stored in the this feature limited the tag lifetime, but for some applications
IC memory. RFID is an automated data-capture technology this is not important, or the tag is designed to live more than
that can be used to electronically identify, track, and store the typical time needed.
information about groups of products, individual items, or Rfid readers:
product components. The technology consists of three key RFID readers are querying systems that interrogate
pieces: or send signals to the tags and receive the responses. These
• RFID tags; responses can be stored within the reader for later transfer to a
• RFID readers; data collection system or instantaneously transferred to the
• A data collection and management data collection system. Like the tags themselves, RFID readers
system. come in many sizes. RFID readers are usually on, continually
Rfid tags: transmitting radio energy and awaiting any tags that enter their
RFID tags are small or miniaturized computer chips field of operation. However, for some applications, this is
programmed with information about a product or with a unnecessary and could be undesirable in battery-powered
number that corresponds to information that is stored in a devices that need to conserve energy. Thus, it is possible to
database. The tags can be located inside or on the surface of configure an RFID reader so that it sends the radio pulse only
the product, item, or packing material. in response to an external event. For example, most electronic
toll collection systems have the reader constantly powered
upon that every passing car will be recorded. On the other
hand, RFID scanners used in veterinarian’s offices are
frequently equipped with triggers and power up the only when
the trigger is pulled. The largest readers might consist of a
desktop personal computer with a special card and multiple
antennas connected to the card through shielded cable. Such a
reader would typically have a network connection as well so
that it could report tags that it reads to other computers. The
smallest readers are the size of a postage stamp and are
designed to be embedded in mobile telephones.
2. General Model for Heart Failure Alert
System:
293
3. Heart Failure Alert System using Rfid Technology
The Heart Failure Alert System consists of:
• RFID Tag (Implanted into Human body).
• RFID Reader (Placed in a Cellular Phone).
• Global Positioning Satellite System.
• Locating & Tracking Station.
• Mobile Rescue Units.
The grain-sized RFID Tag is implanted into the human body, Fig: Grain sized RFID Tag
which keeps track of the heart pulse in the form of Voltage RFID Tags are smaller than a grain of rice and equipped with
levels. A RFID Reader is placed into the Cellular Phone. The a tiny antenna will capture and wirelessly transmit a person's
RFID Reader sends a Command to the RFID Tag which in vital body-function data, such as pulse and do not require line
turn sends these Voltage pulses in the form of bits using the of sight. These tags are capable of identifying the Heart pulses
Embedded Software in the Tag as Response which is a in the form of Voltage levels and converts into a bit sequence.
continuous process. These bit sequence is then sent to The first step in A-D Conversion is Pulse Amplitude
Software Program in the Cellular Phone as input and checks Modulation(PAM).This takes an Analog signal, samples it and
for the Condition of Heart Failure. If any sign of Failure is generates a sequence of pulses based on the results of the
sensed then immediately an ALERT Signal will be generated Sampling(measuring the Amplitude at equal
and in turn results in the AUTODIALING to the Locating & intervals)PCM(Pulse Code Modulation)quantizes PAM
Tracking Station. This station with the use of GPS System Pulses.ie the method of assigning integral values in a specific
comes to know the Whereabouts of the Victim. The Locating range to sampled instances. The binary encoding of these
& Tracking Station also simultaneously alerts the Rescue integral values is done based on the Algorithm BIN_ENC
Units. depending on the Average Heart pulse voltage of the Victim
3. Working of implanted rfid tags: (Avg_pulse).
Passive RFID systems typically couple the transmitter Alg BIN_ENC:
to the receiver with either load modulation or backscatter, Step1: Read the Analog Signals from the Heart.
depending on whether the tags are operating in the near or far Step2: Sample the Analog Signal and generate series of
field of the reader, respectively. In the near field, a tag couples pulses based on the
with a reader via electromagnetic inductance. The antennas of Results of Sampling based on the Tag Frequency.
both the reader and the tag are formed as coils, using many Step3: Assign Integral Values to each Sampled Instances
turns of small gauge wire. The reader communicates with the generated.
tag by modulating a carrier wave, which it does by varying the Step4: Consider every Individual Sampled Unit and
amplitude, phase, or frequency of the carrier, depending on the Compare with the Average
design of the RFID system in question. The tag communicates
with the reader by varying how much it loads its antenna. This Voltage Level of the Heart.
in turn affects the voltage across the reader’s antenna. By Step5: If the Sampled Instance Value is in between the
switching the load on and off rapidly, the tag can establish its avg_pulse Values
own carrier frequency (really a sub carrier) that the tag can in Then Assign BIT=0
turn modulate to communicate its reply. Otherwise Assign BIT=1
Step6: Generate the bit sequence by considering all the
generated Individual
Sample Instances.
294
4. International Conference on Systemics, Cybernetics and Informatics
Algorithm ALERT.
Alg ALERT:
Step 1: Read the bit sequence from the Reader.
Step 2: Count for the no of bit zeros in the data using
a counter.
Step 3: If you encounter a bit one, then set counter to
zero.
Step 4: If the counter is equal to five then go to Step 5
else go to Step 1.
Step 5: Send alert to the nearest Locating & Tracking
Station.
Fig: Analog-Binary Digits Conversion in Tags
4. Stages In Heart Failure Alert System:
Stage 1:
Working of rfid reader inside cellular phone:
The RFID reader sends a pulse of radio energy to the tag and
listens for the Tag’s response. The tag detects this energy and
sends back a response that contains the tag’s serial number
and possibly other information as well. In simple RFID
systems, the reader’s pulse of energy functioned as an on-off The Tag continuously senses the Heart Pulses, when the
switch; in more sophisticated systems, the reader’s RF signal Reader sends a Command it sends the output of the
can contain commands to the tag, instructions to read or write BIN_ENC() as the Response to the Reader.
memory that the tag contains. Historically, RFID readers were
/*Module for the Conversion of Analog Signals to Binary
designed to read only a particular kind of tag, RFID readers digits*/
are usually on, continually transmitting radio energy and BIN_ENC()
awaiting any tags that enter their field of operation. {
Scanf (“The Value of the generated Sample %f”, Value);
If (+Avg_pulse<Value<-Ang_pulse)
{Bit=0 ;}
else if (Value>+Avg_pulse || Value<-Avg_pulse)
{Bit=1 ;}
}
Fig: RFID Reader in cellular phone.
The Reader continuously sends the Command to the tags and
Stage 2:
in turn receives the Voltage levels in the form of bit sequence
as Response from the tags with the help of the BIN_ENC
algorithm. The reader sends the received Bit Sequence to a
software embedded in the cellular phone , In case of detection
of a weak heart pulse this software automatically alerts the
Tracking & Location station . The software uses the
295
5. Heart Failure Alert System using Rfid Technology
simultaneous ALERT to both the GPS System & Mobile
The bits obtained are sent to the ALERT() program to check Rescue Unit in order to alert the Rescue team in the Mobile
whether the bit is ’BIT 0’ or ’BIT 1’.If a ‘BIT 0’ is Rescue Unit to indicate a possible Heart Failure within the
encountered, the counter is incremented and again it checks radius of the Unit. The GPS System mean-while tracks the
for the next bit. If a ‘BIT 1’is encountered then counter is set exact location of the Victim and it guides the Mobile Rescue
to zero and it again checks for the next bit. If counter=5 then it Unit to the destination in time and provides immediate
alerts the Locating & Tracking Station. medical assistance to the Victim.
/*Module for checking the Weak Pulse */ 5. Conclusion:
ALERT () This new technology will open up a new era in the
{ field of Biomedical Engineering .The only drawback of this
if (bit==0) technology is that, It doesn’t give the promise of saving every
{ counter++; } person who is implanted with the tag and using this
else technology. In the near future; we would like to extend the
{counter=0 ;} technology so that every customer who is implanted with the
if(counter==5) tags and those who have been using the technology will be
{ saved. The Worlds first GSM phone (NOKIA 5140)offering
printf(“ Report ‘Weak Pulse Detected’ to Locating & with RFID reading capability has already come into the
Tracking System”); market, In the near future the rfid readers would come into the
counter=0; wrist watches, which would be handy than the cellular phones.
} This new technology would probably become cheaper in the
} future. In the near future we hope this new technology would
Stage 3: probably reduce the deaths due to heart failures.
Fig: Nokia 5140 Handset offering RIFD Reader
A Special ALERT message is sent to the Locating & Tracking 6. a. Web References:
System through the Cellular Phone by making use of features 1.”Identity chip planted under the skin approved for use in
like AutoMessaging, Autodialling which will be provided by Health care”.
the Cellular Network Service Provider. Then the Locating & URL: http://www.spychips.com
Tracking Station simultaneously sends an ALERT to the 2.”RFID Tags and RFID Chips”
Mobile Rescue Unit and sends a request to GPS System for URL: http://www.rfidjournal.com
the proper location of the RFID Reader (or the Cellular 3.”Latest Updates on RFID”
Phone).The Locating & Tracking Station sends an
296
6. International Conference on Systemics, Cybernetics and Informatics
URL: http://www.rfidnews.com EMAIL:-karanatipraneeth@yahoo.com,
4. "Fundamentals and Applications in Contact less Smart ph-no:040-27000965,9441885112
Cards and Identification" 3. B.V.S.Sripathi: : Currently pursuing his B.Tech in
URL:http://www.rfid-handbook.de/index.html 3rd year, Electronics and communications
5.”Annual review of Bio-medical Engineering:” Engineering in Guru Nanak Engineering College,
URL: http://www.ide.com Ibrahimpatnam. His areas of inetersts are radio wave
6.”Injectable Electronic Identification, Monitoring and propagation, Digital communications, Signals and
Simulating Systems” systems and digital electronics
URL: http://www.in-stat.com EMAIL:-santhosh_gnec@yahoo.co.in,
7.”Changing the world for less than the price of a cup of a Ph-no: 040-27115512
coffee”
URL: http://www.line56.com
8. www.siliconchip.com.au
9. www.wdrg.com/news/currentPR/rfid.html
10. www.digitalangel.net
6. b. Other References:
1. RFID SECURITY – by Pete Lindstorm
2. RFID ESSENTIALS – by Bill Glover, Himanshu
Bhatt
3. RFID Case Studies - by Dr. Peter Harrop
4. RFID - George P. Lister
7. Authors:
1. C.Sri Aditya: Currently pursuing his B.Tech in 3rd
year, Electrical and electronics Engineering in Guru
Nanak Engineering College, Ibrahimpatnam.. He
has presented a paper based on ‘Fuel Cells’ along
with other classmates at Guru Nanak Dev
Engineering college, Bidar. And also secured the
third place at the techno-quiz held at the same
college. His area of interests are Power electronics,
Power systems, Nano generators, radio wave
propagation EMAIL:aditya.moorthi@gmail.com
Ph.No : 040-40158638, 040-27135238
2. K.S.Praneeth: Currently pursuing his B.Tech 3rd
year in Computer science and engineering at Guru
Nanak Engineering College, Ibrahimpatnam. His
area of interests is computer programming, artificial
intelligence, data communications, and radio wave
propagation.
297