System for simultaneous object identification & sector indoor localization (OIDSIL)

Nowadays ICT technology is infiltrated to all areas of human existence and the number of objects, animate or inanimate, actively acting within Internet services is rapidly growing. The reasons of object monitoring are permanently changing and evolving, following the development of public and non-pub...

Full description

Saved in:
Bibliographic Details
Published in2014 International Conference on Intelligent Green Building and Smart Grid (IGBSG) pp. 1 - 4
Main Authors Holý, Radek, Kalika, Marek, Kaliková, Jana, Havlik, Jiri, Barak, Petr, Neburka, Jakub
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.04.2014
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Nowadays ICT technology is infiltrated to all areas of human existence and the number of objects, animate or inanimate, actively acting within Internet services is rapidly growing. The reasons of object monitoring are permanently changing and evolving, following the development of public and non-public sectors. For example using of various tags, stuck on goods, are used for goods identification in stores and for security reasons for many years. Further, the assets identification using passive tags turns to active identification enabling automatic inventorying and permanent assets protection at the same time. Active identification provides also the remote monitoring of objects, moreover, when object's data are safely shared on Internet environment, a number of cloud services can be enabled to allow customers remote monitoring of objects. Based on such ICT environment, the architecture called Internet of Things is ready to come to daily life. The objects considered in such systems can be home appliances, medical devices, building assets, computers, mobile devices, cars, production components, manufacturing tools, building materials and, of course, people. Especially the bindings and relations among objects, for example an identified person having an expensive identified device and passing unauthorized zone is evaluated as a risk transaction resulting to a denied access. Beside the object identification the differentiation of static and moving objects brings a new important parameter to improve the IoT concept.
DOI:10.1109/IGBSG.2014.6835242