Crypt-Tag Authentication in NFC Implementation for Medicine Data Management
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 9
Abstract
This study focus on the implementation of expiry date detection for medicine using RFID in the health care industry. The motivation for doing this research is the process of searching for the expired medicine is a time consuming and lack of security features included in current NFC implementation. Therefore, the objective of this research is to study the RFID technology used for detecting medicine expiry product and to develop a new system that integrated NFC with authentication feature. Moreover, the problem of current data management for medicine still using manual or barcode system that lead to inconsistency, easy duplication and human error. Here, the NFC is chosen, due to smaller distance of signal coverage, since less interference and the time spending for sniffing activity by the hacker can be reduced. The system is developed using C#, SQLite, Visual Studio, NFC Tag and NFC reader (ACR122U-A9). Experiments have shown that the proposed system has produced medicine expiry date system and only authorized person in charge can monitor the medicine. The impact of the proposed system produces safer, greener and easier environment for better medicine data management. The significance of this study gives a medicine expiry date detection system for health care.
Authors and Affiliations
Z. Zainal Abidin, N. A. Zakaria, N. Harum, M. R. Baharon, Ee-Song Hong, Z. Abal Abas, Z. Ayop, N. A. Mat Ariff
Competence Making on Computer Engineering Program by Using Analytical Hierarchy Process (AHP)
This paper shows competence election for the students of the Academy of Information Management and Computer (AIMC) Mataram on computer engineering courses who completed the study in semester 1, 2 and 3 and choose lesson...
Detection of Mass Panic using Internet of Things and Machine Learning
The increase of emergency situations that cause mass panic in mass gatherings, such as terrorist attacks, random shooting, stampede, and fires, sheds light on the fact that advancements in technology should contribute in...
Load Balancing based on Bee Colony Algorithm with Partitioning of Public Clouds
Cloud computing is an emerging trend in the IT industry that provides new opportunities to control costs associated with the creation and maintenance of applications. Of prevalent issues in cloud computing, load balancin...
Towards a Mechanism for Protecting Seller’s Interest of Cash on Delivery by using Smart Contract in Hyperledger
In emerging economies, with the explosion of e-commerce, payment methods have increasingly enhanced security. However, Cash-on-Delivery (COD) payment method still prevails in cash-based economies. Although COD allows con...
Improved-Node-Probability Method for Decision Making in Priority Determination of Village Development Proposed Program
This research proposes a new method, the probability of nodes (NP) and the cumulative frequency of indicators within the framework of Bayesian networks to calculate the weight of participation. This method uses the PLS-P...