This system ultimately became one of the first building entry systems based on the first commercial use of RFID.
The RF tags could be divided in two major groups: Heart Failure Alert System using Rfid Technology Passive , where the power to energize the tags circuitry is
C.Sri Aditya id entification is a technology K.S.Praneeth B.V.S.Sripathi RFID or Radio Frequency that draw from the reader generated field. EEE Department CSE Department ECE Department enables the (3rd tracking or identification of objects using IC based Active , in this case the tag has an internal power source, in year, 1st sem) (3rd year, 1st sem) (3rd year, 1st sem) Guru Nanak Engg. Guru Nanak Engg. College Guru Nanakor Engg. College tags with an RF circuit andCollege antenna, and RF readers that general a battery that could be replaceable not, in some case
"read" and in some case modify the information stored in the IC memory. RFID is an automated data-capture technology this feature limited the tag lifetime, but for some applications this is not important, or the tag is designed to live more than the typical time needed. This gives a predicted general model for Heart Failure Rfid paper readers: Alert System. It also discusses the Algorithm converting RFID readers are querying systemsfor that interrogate the Analog pulse Binary data in the the tag responses. and the Algorithm or send signals to to the tags and receive These for Alerting the Location & Tracking Station. It discusses responses can be stored within the reader for later transfer in to a detail the various stages in tracking the exact data collection system orinvolved instantaneously transferred tolocation the of the Victim using thisLike technology. data collection system. the tags themselves, RFID readers Keywords: come in many sizes. RFID readers are usually on, continually RFID, RFID-passive tags,and GPS, PAM. any tags that enter their transmitting radio energy awaiting
2. General Model for Heart Failure Alert problem. Our primary focus is on people with a history of System:
Copyright 2007 Pa per Identification Number: SC-5.4 This peer-reviewed paper has been published by the Pentagram Research Centre (P) Limited. Responsibility of contents of this paper rests upon the authors and not upon Pentagram Research Centre (P) Limited. Copies can be obtained from the comp any for a cost
heart problem as they are more prone to death due to heart failure. In the 1970s, a group of scientists at the Lawrence Livermore Laboratory (LLL) realized that a handheld receiver stimulated by RF power could send back a coded radio signal. Such a system could be connected to a simple computer and used to control access to a secure facility.
292 293
The Heart Failure Alert System consists of: RFID Tag (Implanted into Human body). RFID Reader (Placed in a Cellular Phone). G lobal P ositioning Satellite System . Locating & T racking Station. Mobile Rescue Units. Fig: Grain sized RFID Tag RFID Tags are smaller than a grain of rice and equipped with a tiny antenna will capture and wirelessly transmit a person's vital body-function data, such as pulse and do not require line of sight. These tags are capable of identifying the Heart pulses in the form of Voltage levels and converts into a bit sequence. The first step in A-D Conversion is Pulse Amplitude Modulation(PAM).This takes an Analog signal, samples it and generates a sequence of pulses based on the results of the Sampling(measuring the Amplitude at equal intervals)PCM(Pulse Code Modulation) quantizes PAM
The grain-sized RFID Tag is implanted into the human body, which keeps track of the heart pulse in the form of Voltage levels. A RFID Reader is placed into the Cellular Phone. The RFID Reader sends a Command to the RFID Tag which in turn sends these Voltage pulses in the form of bits using the Embedded Software in the Tag as Response which is a continuous process. These bit sequence is then sent to Software Program in the Cellular Phone as input and checks for the Condition of Heart Failure. If any sign of Failure is sensed then immediately an ALERT Signal will be generated and in turn results in the AUTODIALING to the Locating & Tracking Station. This station with the use of GPS System comes to know the Whereabouts of the Victim. The Locating & Tracking Station also simultaneously alerts the Rescue Units.
Pulses.ie the method of assigning integral values in a specific range to sampled instances. The binary encoding of these integral values is done based on the Algorithm BIN_ENC
depending on the Average Heart pulse voltage of the Victim (Avg_pulse ). Alg BIN_ENC: Step1: Read the Analog Signals from the Heart. Step2: Sample the Analog Signal and generate series of pulses based on the Results of Sampling based on the Tag Frequency. Step3: Assign Integral Values to each Sampled Instances generated. Step4: Consider every Individual Sampled Unit and Compare with the Average Voltage Level of the Heart. Step5: If the Sampled Instance Value is in between the avg_pulse Values Then Assign BIT=0 Otherwise Assign BIT=1 Step6: Generate the bit sequence by considering all the generated Individual Sample Instances.
depending on whether the tags are operating in the near or far field of the reader, respectively. In the near field, a tag couples with a reader via electromagnetic inductance. The antennas of both the reader and the tag are formed as coils, using many turns of small gauge wire. The reader communicates with the tag by modulating a carrier wave, which it does by varying the amplitude, phase, or frequency of the carrier, depending on the design of the RFID system in question. The tag communicates with the reader by varying how much it loads its antenna. This in turn affects the voltage across the readers antenna. By switching the load on and off rapidly, the tag can establish its own carrier frequency (really a sub carrier) that the tag can in turn modulate to communicate its reply.
294
Algorithm ALERT . Alg ALERT: Step 1: Read the bit sequence from the Reader. Step 2: Count for the no of bit zeros in the data using a counter. Step 3: If you encounter a bit one, then set counter to zero. Step 4: If the counter is equal to five then go to Step 5 else go to Step 1. Step 5: Send alert to the nearest Locating & Tracking Station. Fig: Analog-Binary Digits Conversion in Tags
Working of rfid reader inside cellular phone: The RFID reader sends a pulse of radio energy to the tag and listens for the Tags response. The tag detects this energy and sends back a response that contains the tags serial number and possibly other information as well. In simple RFID systems, the readers pulse of energy functioned as an on-off switch; in more sophisticated systems, the readers RF signal can contain commands to the tag, instructions to read or write memory that the tag contains. Historically, RFID readers were designed to read only a particular kind of tag, RFID readers are usually on, continually transmitting radio energy and awaiting any tags that enter their field of operation. The Tag continuously senses the Heart Pulses, when the Reader sends a Command it sends the output of the BIN_ENC() as the Response to the Reader. /*Module for the Conversion of Analog Signals to Binary digits*/ BIN_ENC() { Scanf (The Value of the generated Sample %f, Value); If (+Avg_pulse<Value<-Ang_pulse) {Bit=0 ;} else if (Value>+Avg_pulse || Value<-Avg_pulse) {Bit=1 ;} } Fig: RFID Reader in cellular phone. The Reader continuously sends the Command to the tags and in turn receives the Voltage levels in the form of bit sequence as Response from the tags with the help of the BIN_ENC algorithm. The reader sends the received Bit Sequence to a software embedded in the cellular phone , In case of detection of a weak heart pulse this software automatically alerts the Tracking & Location station . The software uses the Stage 2:
295
simultaneous ALERT to both the GPS System & Mobile The bits obtained are sent to the ALERT() program to check whether the bit is BIT 0 or BIT 1.If a BIT 0 is encountered, the counter is incremented and again it checks for the next bit. If a BIT 1is encountered then counter is set to zero and it again checks for the next bit. If counter=5 then it alerts the Locating & Tracking Station. /*Module for checking the Weak Pulse */ ALERT () { if (bit==0) { counter++; else {counter=0 ;} if(counter==5) { printf( Report Weak Pulse Detected to Locating & Tracking System); counter=0; } } Stage 3: } Rescue Unit in order to alert the Rescue team in the Mobile Rescue Unit to indicate a possible Heart Failure within the radius of the Unit. The GPS System mean-while tracks the exact location of the Victim and it guides the Mobile Rescue Unit to the destination in time and provides immediate medical assistance to the Victim.
5. Conclusion:
This new technology will open up a new era in the field of Biomedical Engineering .The only drawback of this technology is that, It doesnt give the promise of saving every person who is implanted with the tag and using this technology. In the near future; we would like to extend the technology so that every customer who is implanted with the tags and those who have been using the technology will be saved. The Worlds first GSM phone ( NOKIA 5140 )offering with RFID reading capability has already come into the market, In the near future the rfid readers would come into the wrist watches, which would be handy than the cellular phones. This new technology would probably become cheaper in the future. In the near future we hope this new technology would probably reduce the deaths due to heart failures.
Fig: Nokia 5140 Handset offering RIFD Reader A Special ALERT message is sent to the Locating & Tracking System through the Cellular Phone by making use of features like AutoMessaging, Autodialling which will be provided by the Cellular Network Service Provider. Then the Locating & Tracking Station simultaneously sends an ALERT to the Mobile Rescue Unit and sends a request to GPS System for the proper location of the RFID Reader (or the Cellular Phone).The Locating & Tracking Station sends an
6. a. Web References:
1.Identity chip planted under the skin approved for use in Health care. URL: http://www.spychips.com 2.RFID Tags and RFID Chips URL: http://www.rfidjournal.com 3.Latest Updates on RFID
296
URL: http://www.rfidnews.com 4. "Fundamentals and Applications in Contact less Smart Cards and Identification" URL:http://www.rfid-handbook.de/index.html 5.Annual review of Bio-medical Engineering: URL: http://www.ide.com 6.Injectable Electronic Identification, Monitoring and Simulating Systems URL: http://www.in-stat.com 7.Changing the world for less than the price of a cup of a coffee URL: http://www.line56.com 8. www.siliconchip.com.au 9. www.wdrg.com/news/currentPR/rfid.html 10. www.digitalangel.net 3.
EMAIL:-karanatipraneeth@yahoo.com, ph-no:040-27000965,9441885112 B.V.S.Sripathi: : Currently pursuing his B.Tech in 3r dyear, Electronics and communications Engineering in Guru Nanak Engineering College, Ibrahimpatnam. His areas of inetersts are radio wave propagation, Digital communications, Signals and systems and digital electronics EMAIL:-santhosh_gnec@yahoo.co.in, Ph-no: 040-27115512
6. b. Other References:
1. RFID SECURITY by Pete Lindstorm 2. RFID ESSENTIALS by Bill Glover, Himanshu Bhatt 3. 4.
7. Authors:
1. C.Sri Aditya: Currently pursuing his B.Tech in 3 year, Electrical and electronics Engineering in Guru Nanak Engineering College, Ibrahimpatnam.. He has presented a paper based on Fuel Cells along with other classmates at Guru Nanak Dev Engineering college, Bidar. And also secured the third place at the techno-quiz held at the same college. His area of interests are Power electronics, Power systems, Nano generators, radio wave propagation EMAIL:aditya.moorthi@gmail.com Ph.No : 040-40158638, 040-27135238 2. K.S.Praneeth: Currently pursuing his B.Tech 3 year in Computer science and engineering at Guru Nanak Engineering College, Ibrahimpatnam. His area of interests is computer programming, artificial intelligence, data communications, and radio wave propagation.
rd rd
297