Over 10 Million Study Resources Now at Your Fingertips


Download as :
Rating : ⭐⭐⭐⭐⭐
Price : $10.99
Language:EN
Pages: 2

And some additional logic and memory

330 RFID Handbook: Applications, Technology, Security, and Privacy

Embedding an RFID tag to a triage tag has the following advantages:

1. Terminal that the emergency personnel use can identify the injured person by the unique ID value in each RFID tag.

Triage with RFID Tags for Massive Incidents
331

This application addresses important challenges for pervasive computing: data integrity, the information that should not be lost after being input; input throughput, the time required to input injured person’s information should be as short as possible; availability, that is, emergency personnel should be able to use the system any time, and low latency of communication. These should be as independent of the network status as possible.

In this chapter, we show a realistic solution for the challenges by specializing the network usage in a way that only particular paths are used in particular stages of the workflow by analyzing the workflow and exploiting RFID tags to slim down the possible paths by the following approaches: input throughput and availability are assured by using RFID tags as local buffer; data integrity is assured and latency is improved by defining minimum wireless communication areas in the paths in triage workflow.

18.2
How It Works
Login account
Login Your Account
Add to cart
Add to Cart
Payment
Make payment
Document download
Download File
PageId: ELI63EAFB0
img
Uploaded by :
70KAKRV3
Page 1 Preview
and some additional logic and memory
Sell Your Old Documents & Earn Wallet Balance