Crypt-Tag Authentication in NFC Implementation for Medicine Data Management
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 9
Abstract
This study focus on the implementation of expiry date detection for medicine using RFID in the health care industry. The motivation for doing this research is the process of searching for the expired medicine is a time consuming and lack of security features included in current NFC implementation. Therefore, the objective of this research is to study the RFID technology used for detecting medicine expiry product and to develop a new system that integrated NFC with authentication feature. Moreover, the problem of current data management for medicine still using manual or barcode system that lead to inconsistency, easy duplication and human error. Here, the NFC is chosen, due to smaller distance of signal coverage, since less interference and the time spending for sniffing activity by the hacker can be reduced. The system is developed using C#, SQLite, Visual Studio, NFC Tag and NFC reader (ACR122U-A9). Experiments have shown that the proposed system has produced medicine expiry date system and only authorized person in charge can monitor the medicine. The impact of the proposed system produces safer, greener and easier environment for better medicine data management. The significance of this study gives a medicine expiry date detection system for health care.
Authors and Affiliations
Z. Zainal Abidin, N. A. Zakaria, N. Harum, M. R. Baharon, Ee-Song Hong, Z. Abal Abas, Z. Ayop, N. A. Mat Ariff
A Study on Usability Awareness in Local IT Industry
Usability awareness receives more consideration by industry professionals and researchers throughout the world, but it is limited in Pakistan. This study reports survey results of the current state of usability awareness...
Resolution of Unsteady Navier-stokes Equations with the C a,b Boundary condition
In this work, we introduce the unsteady incompressible Navier-Stokes equations with a new boundary condition, generalizes the Dirichlet and the Neumann conditions. Then we derive an adequate variational formulation of ti...
Cyber Terrorist Detection by using Integration of Krill Herd and Simulated Annealing Algorithms
This paper presents a technique to detect cyber terrorists suspected activities over the net by integrating the Krill Herd and Simulated Annealing algorithms. Three new level of categorizations, including low, high, and...
Optical Recognition of Isolated Machine Printed Sindhi Characters using Fourier Descriptors
The scale invariance characteristics play an essential role in pattern recognition applications, for example in computer vision, OCR (Optical Character Recognition), electronic publication, etc. In this paper, the shape...
OpenSimulator based Multi-User Virtual World: A Framework for the Creation of Distant and Virtual Practical Activities
The exponential growth of technology has contributed to the positive revolution of distance learning. E-learning is becoming increasingly used in the transfer of knowledge where instructors can model and script their cou...