Table of Contents Author Guidelines Submit a Manuscript
Journal of Engineering
Volume 2017, Article ID 3850835, 15 pages
https://doi.org/10.1155/2017/3850835
Research Article

Experimental Study on RFID Antenna Reading Areas in a Tunnel System

1BioMediTech Institute and Faculty of Biomedical Sciences and Engineering, Tampere University of Technology, Tampere, Finland
2Aitosolutions Oyj, Kangasala, Finland

Correspondence should be addressed to Kai Kordelin; ue.niledrok@iak

Received 14 March 2017; Accepted 27 July 2017; Published 30 August 2017

Academic Editor: Yuh-Shyan Hwang

Copyright © 2017 Kai Kordelin et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Misra, S. Kanhere, D. Ostry, and S. Jha, “Safety assurance and rescue communication systems in high-stress environments: a mining case study,” IEEE Communications Magazine, vol. 48, no. 4, pp. 66–73, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. T. Saanio, A. Ikonen, P. Keto et al., “Design of the Disposal Facility 2012,” Working Report 2013-17, Posiva Oy, Eurajoki, Finland, 2012. View at Google Scholar
  3. Z. Shi, Y. Li, and Q. Gu, “Based on TWA adaptive centroid wireless localization algorithm of area in underground mine,” Advances in Information Sciences and Service Sciences, vol. 4, no. 19, pp. 191–196, 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. L. Bai-Ping, L. Shang, L. Wen-Feng, and L. Chen, “Research on coal mine personnel orientation rescuing system based on RFID,” in Proceedings of the International Conference on MultiMedia and Information Technology (MMIT '08), pp. 555–557, Three Gorges, China, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  5. A. Wang and Y. Lu, “The design and implementation of mine workers' precise location system,” in Proceedings of the 2nd Conference on Environmental Science and Information Application Technology (ESIAT '10), pp. 303–305, Wuhan, China, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. U. Farooq, K. M. Hasan, F. Rafiq, and M. U. Asad, “An integrated approach towards designing an embedded wireless monitoring and access control system using RFID and MMS technologies,” in Proceedings of the 16th International Multi Topic Conference (INMIC '13), pp. 182–188, Lahore, Pakistan, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. C. Hurjui, C. Turcu, and A. Graur, “Management system of the products on warranty based on RFID technologies,” in Proceedings of the 11th International Conference on Optimization of Electrical and Electronic Equipment (OPTIM '08), pp. 231–236, IEEE, Brașov, Romania, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  8. A. Mai, Z. Wei, and M. Gao, “An access control and positioning security management system based on RFID,” in Proceedings of the 7th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC '15), pp. 537–540, Hangzhou, China, August 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. J. Landt, “The history of RFID,” IEEE Potentials, vol. 24, no. 4, pp. 8–11, 2005. View at Publisher · View at Google Scholar · View at Scopus
  10. P. Nikitin, “Leon Theremin (Lev Termen),” IEEE Antennas and Propagation Magazine, vol. 54, no. 5, pp. 252–257, 2012. View at Publisher · View at Google Scholar
  11. R. Want, “An introduction to RFID technology,” IEEE Pervasive Computing, vol. 5, no. 1, pp. 25–33, 2006. View at Publisher · View at Google Scholar · View at Scopus
  12. D. Dobkin, The RF in RFID: Passive UHF RFID in Practice, Newnes-Elsevier, Netherland, Amsterdam, 2008.
  13. Z. Sun and I. F. Akyildiz, “Optimal MIMO antenna geometry analysis for wireless networks in underground tunnels,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '09), pp. 1–6, Honolulu, Hawaii, USA, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. L. Sydanheimo, M. Keskilammi, and M. Kivikoski, “Reliable mobile computing to underground mine,” in Proceedings of the IEEE International Conference on Communications (ICC '00), pp. 882–888, June 2000. View at Scopus
  15. K. Kordelin, J. Kordelin, M. Johansson, J. Virkki, L. Ukkonen, and L. Sydänheimo, “Development and implementation of an RFID-based tunnel access monitoring system,” Science and Technology of Nuclear Installations, vol. 2016, Article ID 9897675, 10 pages, 2016. View at Publisher · View at Google Scholar · View at Scopus
  16. Paroc Web-pages, 2016, http://www.paroc.com.