Skip to main content

Information Management System for an Administrative Office with RFID-Tagged Classified Documents

  • Chapter
  • First Online:
Book cover Data-Centric Business and Applications

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 40))

  • 707 Accesses

Abstract

The paper presents system architecture for the RFID-equipped restricted access administrative office. All the facilities in the administrative office are equipped with RFID readers placed in cabinets, desks, copiers and entrance sluices to allow immediately read of documents that are within their reach. Presented hardware and software components as well as business and simulation models are result of analytical work performed by the group of experts. The team was composed of specialist in different fields, such as document management, IT, data security, radio frequency identification, etc. In addition to the hardware and software architectures, an approach to system evaluation based on computer simulation is also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Finkenzeller K (2003) RFID handbook: fundamentals and applications in contactless smart cards and identification, 2nd edn. Wiley

    Google Scholar 

  2. Cole PH, Ranasinghe DC (2008) Networked RFID systems and lightweight cryptography. Springer

    Google Scholar 

  3. Zhang Y, Yang LT, Chen J (2009) RFID and sensor networks architectures, protocols, security and integrations. CRC Press

    Google Scholar 

  4. Paret D (2009) RFID at ultra and super high frequencies. Theory and application. Wiley

    Google Scholar 

  5. Bolic M, Simplot-Ryl D, Stojmenovic I (2010) RFID systems research trends and challenges. Wiley

    Google Scholar 

  6. Miles SB, Sarma SE, Williams JR (2008) RFID technology and applications. Cambridge University Press

    Google Scholar 

  7. noFilis, CrossTalk AppCenter 3.0 Installation and Administration Guide

    Google Scholar 

  8. Canon UniFLOW documentation. www.canon.com

  9. Aurea BPM system documentation. aurea-bpm.com

  10. Kiedrowicz M, Nowicki T, Waszkowski R, Wesolowski Z, Worwa K (2016) Method for assessing software reliability of the document management system using the RFID technology. In: Mastorakis N, Mladenov V, Bulucea A (eds) 20th international conference on circuits, systems, communications and computers, vol 76. MATEC Web of Conferences, Cedex A: E D P Sciences

    Google Scholar 

  11. Kiedrowicz M, Nowicki T, Waszkowski R, Wesolowski Z, Worwa K (2016) Optimization of the document placement in the RFID cabinet. In: Mastorakis N, Mladenov V, Bulucea A (eds) 20th international conference on circuits, systems, communications and computers, vol 76. MATEC Web of Conferences, Cedex A: E D P Sciences

    Article  Google Scholar 

  12. Kiedrowicz M, Nowicki T, Waszkowski R, Wesolowski Z, Worwa K (2016) Software simulator for property investigation of document management system with RFID tags. In: Mastorakis N, Mladenov V, Bulucea A (eds) 20th international conference on circuits, systems, communications and computers, vol 76. MATEC Web of Conferences, Cedex A: E D P Sciences

    Article  Google Scholar 

  13. Nowicki T, Pytlak R, Waszkowski R, Bertrandt J (2013) The method for finding optimal sanitary inspectors schedules (in English). Ann Nutr Metab 63:1027

    Google Scholar 

  14. Nowicki T, Pytlak R, Waszkowski R, Zawadzki T, Migdal W, Bertrandt J (2013) Creating and calibrating models of food-borne epidemics (in English). Ann Nutr Metab 63:1027

    Google Scholar 

  15. Waszkowski R, Agata C, Kiedrowicz M, Nowicki T, Wesolowski Z, Worwa K (2016) Data flow between RFID devices in a modern restricted access administrative office. In: Mastorakis N, Mladenov V, Bulucea A (eds) 20th international conference on circuits, systems, communications and computers, vol 76. MATEC Web of Conferences, Cedex A: E D P Sciences

    Google Scholar 

  16. Waszkowski R, Kiedrowicz M, Nowicki T, Wesolowski Z, Worwa K (2016) Business processes in the RFID-equipped restricted access administrative office. In: Mastorakis N, Mladenov V, Bulucea A (eds) 20th international conference on circuits, systems, communications and computers, vol 76. MATEC Web of Conferences, Cedex A: E D P Sciences

    Google Scholar 

  17. Braude EJ, Bernstein ME (2011) Software engineering: modern approaches. Wiley

    Google Scholar 

  18. Larman C (2012) Applying UML and patterns: an introduction to object-oriented analysis and design and iterative development. 3/e, Pearson Education India

    Google Scholar 

  19. Ross SM (2006) Simulation. Elsevier Inc

    Google Scholar 

  20. Sinclair B (2004) Simulation of computer systems and computer networks: a process-oriented approach. University Press, Cambridge, UK

    Google Scholar 

  21. Fishman GS (2001) Discrete event simulation. Modeling, programming and analysis. Springer, New York

    Google Scholar 

  22. Abu-Taieh EM, El Sheikh AAR (2010) Handbook of research on discrete event simulation environments: technologies and applications. IGI Global, Hershey, New York

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tadeusz Nowicki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Waszkowski, R., Nowicki, T. (2020). Information Management System for an Administrative Office with RFID-Tagged Classified Documents. In: Poniszewska-Marańda, A., Kryvinska, N., Jarząbek, S., Madeyski, L. (eds) Data-Centric Business and Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 40. Springer, Cham. https://doi.org/10.1007/978-3-030-34706-2_3

Download citation

Publish with us

Policies and ethics