Skip to main content
Log in

Automated management of assets based on RFID triggered alarm messages

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

Asset management has long been considered as an important issue in enterprises. With the maturing of the Radio Frequency Identification (RFID) technology, automated management of assets (particularly for mobile ones) in an enterprise using RFID becomes practical. We have developed a RFID-based Asset Management System (RAMS) for a large telecommunication enterprise and this paper details how we maintain the whole life-cycle of assets from their acquisition, transfer, maintenance, audit taking, to retirement. Our system also displays spatial information of assets on an electronic geographical map using Web-based Geographical Information System (WebGIS) technology. Further asset security is improved by automated notification of asset movement and malfunction alarm through Short Message System (SMS). To improve the sending time of the alarm SMSs that have high priority, we also develop a Maximum Position First (MPF) speed-up algorithm for their scheduling. Our initial deployment shows that our system can improve the availability of assets and reduce the asset management cost dramatically.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Attaran, M. (2007). RFID: an enabler of supply chain operations. Supply Chain Management: An International Journal, 12(4), 249–257.

    Article  Google Scholar 

  • Attie, P., Singh, M., Sheth, A., & Rusinkiewicz, M. (1993). Specifying and Enforcing Intertask Dependencies. Proceedings of the 19th International Conference VLDB, 134–145.

  • Barber, G., & Tsibertzopoulos, E. (2005). An analysis of using epcglobal class-1 generation-2 rfid technology for wireless asset management. Proceedings of the IEEE Military Communications Conference (MILCOM 2005), 1, 245–251.

    Google Scholar 

  • Buckner, M., Crutcher, R., Moore, M., & Whitus, B. (2002). Miclog RFID tag program enables total asset visibility. Proceedings of the IEEE Military Communications Conference (MILCOM 2002), 2, 422–1426.

    Google Scholar 

  • Casati, F., & Shan, M. (2002). Semantics analysis of business process execution. Advances in Database Technologies—EDBT, 2002, 119–135.

    Google Scholar 

  • Chow, H. K. H., Choy, K. L., Lee, W. B., & Chan, F. T. S. (2007). RFID integration of web-based and RFID technology in visualizing logistics operations—a case study. Supply Chain Management: An International Journal, 12(3), 221–234.

    Article  Google Scholar 

  • Dadam, P., & Reichert, M. (1998). The ADEPT WfMS project at the university of Ulm, 1st European workshop on Workflow and Process Management (WPM’98). Switzerland: Zurich.

    Google Scholar 

  • Dayal, U., Hsu, H., & Ladin, R. (1990). Organizing long-running activities with triggers and transactions. Proceeding of the ACM SIGMOD Conference on Management of Data, 201–214.

  • Elmagarmid, A. K., Leu, Y., Litwin, W., & Rusinkiewicz, M. (1990). A Multidatabase Transaction Model for Interbase. Proceedings of the 16th International Conference VLDB, 507–518.

  • Garfinkel, S., & Rosenberg, B. (2005). RFID—Applications, Security and Privacy, Addison-Wesley Professional.

  • Gunasekarana, A., Ngaib, E. W. T., & McGaugheyc, R. E. (2006). Information technology and systems justification: a review for research and applications. European Journal of Operational Research, 173(3), 957–983.

    Article  Google Scholar 

  • Hakim, H., Renouf, R., & Enderle, J. (2006). Passive RFID asset monitoring system in hospital environments. Proceedings of the 32nd Annual Northeast Bioengineering Conference, 217–218.

  • Hassan, T., & Chatterjee, S. (2006). A taxonomy for RFID. Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS’06), Big Island Hawaii, IEEE Computer Society Press, CDROM, p. 10.

  • Holmqvist, M., & Stefansson, G. (2006). Mobile RFID—a case from volvo on innovation in SCM. Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS’06), Big Island Hawaii, IEEE Computer Society Press, CDROM, p. 10.

  • Kafeza, E., & Karlapalem, K. (2000). Speeding up electronic commerce activities using CapBasED/AMS. 2nd International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS2000), San Jose, 192–192.

  • Kafeza, E., Chiu, D. K. W., Cheung, S. C., & Kafeza, M. (2004). Alerts in Mobile healthcare applications: requirements and pilot study. IEEE Transactions on Information Technology for Biomedicine, 8(2), 173–181.

    Article  Google Scholar 

  • Kafeza, E., Chiu, D. K. W., Karlapalem, K. (2006). Improving the Response Time of Business Processes: An Alert-based Analytical Approach. Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS’06), Big Island, Hawaii, IEEE Computer Society Press, CDROM, p. 10.

  • Krishna, C. M., & Shin, K. G. (1997). Real Time Systems. McGraw-Hill.

  • Kwon, H.-S., Cho, J.-H., Kim, H.-S., Lee, J.-H., Song, B.-R., Oh, J.-A., et al. (2004). Development of web-based diabetic patient management system using short message service (SMS). Diabetes Research and Clinical Practice, 66(suppl 1), S133–137.

    Article  Google Scholar 

  • Li, W., & Peng, L. (2005). Upgrade ERP from C/S to B/S based on web service. Proceedings of International Conference on Services Systems and Services Management (ICSSSM ’05), 1, 593–597.

    Article  Google Scholar 

  • Luo, Y., Wang, X., & Xu, Z. (2001). Design of a framework for multi-user/application oriented WEBGIS services. Proceedings of the International Conference on Computer Networks and Mobile Computing, 151–156.

  • Meng, S., Liu, W., Li, Q., Chiu, D. K. W., & Chen X. (2008) Automated management of assets based on RFID. Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2008), Tai Chung, Taiwan, IEEE Computer Society Press, 296–301.

  • Ngai E.W.T., Cheng T.C.E., Au S., Lai K.-h. (2007). Mobile commerce integrated with RFID technology in a container depot. Decision Support Systems, 43(1), 62–76.

    Article  Google Scholar 

  • Poirier, C., & Mccollum, D. (2006). RFID strategic implementation and ROI: A practical roadmap to success. J. Ross Publishing.

  • Rusinkiewicz, M., & Sheth, A. (1994). Specification and execution of transactional workflows. In W. Kim (Ed.), Modern database systems: The object model, interoperability, and beyond. Addison-Wesley.

  • Spuri, M., & Stankovic, J. A. (1994). How to integrate precedence constraints and shared resources in real time scheduling. IEEE Transactions on Computers, 43(12), 1407–1412.

    Article  Google Scholar 

  • Stallings, W. (2004) Wireless communications & networks (2nd ed.). Prentice Hall.

  • Stankovic, J. A., Lu, C., Son, S. H., & Tao, G. (1999). The case for feedback control real-time scheduling. Proceedings of the 11th EuroMicro Conference on real time systems, 11–20.

  • Viehland, D., & Wong, A. (2007). The future of radio frequency identification. Journal of Theoretical and Applied Electronic Commerce Research, 2(2), 74–81.

    Google Scholar 

Download references

Acknowledgement

We thank a generous funding support from the Future Network Centre (FNC) of the City University of Hong Kong (CityU), under the grant numbered 9681001 through CityU Applied R&D Centre (Shenzhen).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dickson K. W. Chiu.

Additional information

A preliminary version of this work was presented at the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (Meng et al. 2008)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Meng, S., Chiu, D.K.W., Kafeza, E. et al. Automated management of assets based on RFID triggered alarm messages. Inf Syst Front 12, 563–578 (2010). https://doi.org/10.1007/s10796-009-9219-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-009-9219-3

Keywords

Navigation