Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Victim Identification and Distress Alert with RFID using Cloud Database


     

   Subscribe/Renew Journal


RFID is an upcoming technology that is being deployed in a number of days to day applications. But RFID systems suffer from drawbacks such as inefficient data administration. There is an increasing urge to tackle these issues to make the technology stand out. Cloud computing is one of the upcoming segments of IT industry that provides efficient solutions for managing and using the data that is collected with RFID. This paper proposes an intelligent distress alert system that not only sends distress alert but also provides the victim’s personal information such as home address, contact details, medical details etc to the predefined contacts (email ids),  which are fetched  from a cloud server when the RFID tag of the victim is scanned. In addition to the alert, it also provides the contacts with the exact location (latitude and longitude) where the incident has taken place.


User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 284

PDF Views: 2




  • Victim Identification and Distress Alert with RFID using Cloud Database

Abstract Views: 284  |  PDF Views: 2

Authors

Abstract


RFID is an upcoming technology that is being deployed in a number of days to day applications. But RFID systems suffer from drawbacks such as inefficient data administration. There is an increasing urge to tackle these issues to make the technology stand out. Cloud computing is one of the upcoming segments of IT industry that provides efficient solutions for managing and using the data that is collected with RFID. This paper proposes an intelligent distress alert system that not only sends distress alert but also provides the victim’s personal information such as home address, contact details, medical details etc to the predefined contacts (email ids),  which are fetched  from a cloud server when the RFID tag of the victim is scanned. In addition to the alert, it also provides the contacts with the exact location (latitude and longitude) where the incident has taken place.




DOI: https://doi.org/10.36039/ciitaas%2F8%2F7%2F2016%2F115743.198-201