RFID Based Efficient Wireless Monitoring System

Nowadays, surveillance has become a need in any private or public area due to the increase in the number of threatssuch as robberies, terrorists, and abusers. In this paper, an efficient wireless monitoring system using Radio Frequency Identity (RFID) is proposed. The aim of this system is to detect a specified target during his movement in the covered region. The efficiency of the proposed system is clearly noticed through both storage capacity and power consuming reduction. This is done by dominating the work of camerasoperation when receiving a signal from the distributed detectors. The obtained results show the saving in power and storage capacity is more efficient in comparison with the traditional monitoring systems. This work has two implemented sides; hardware and simulated environment that using Microsoft visual studio (C# framework).


INTRODUCTION
Recently, monitoring systems play a major role in highly secured areas. The most common monitoring system produces a continuous image and has various problems such as high cost, the need for human intervention continuously, and an inherent difficulty in locating and identifying the intruder because existence of obstacles [1].
The main advantage of wireless connectivity over wire connections is that they support more desirable advantages like accessibility, easy installation, easy enhanced user friendliness, and easy adding new devices to existing networks i.e., expandability [2].RFID is a wireless technology that has been utilized for automated remote identification of objects. An RFID system uses wireless radio communication technology to uniquely identify tagged objects or people. Nowadays, RFID is applied widely in retail stock, supply-chain tracking, management, library book tracking, parking access control, marathon races, airline luggage tracking, toll collection, electronic security keys, theft prevention, and healthcare [3].
The authors of [4] designed an RFID Kids Tracking System to track a moving child in a wide area, such as mall or a park, using RFID technology. This system includes hardware and software components. The hardware architecture contains an RFID active tag, RFID tag reader, web server and database server. The software architecture contains a communication driver that handles all communication functions done in the master station, an Application Programming Interface (API) that handles and analyzes the data, a friendly Graphical User Interface (GUI) and a database that saves all readings and client Information.
In [5], the authors developed an RFID-based e-restaurant system to change the traditional restaurant services which is observed as passive. The utilization of RFID is to improve the service quality which is customer-centered that enable waiters to immediately identify customers via their own RFID-based membership card.
The authors of [6] analyzed the applicability and performance of the Passive Infrared (PIR) sensors for security systems. They proposed a region-based human tracking algorithm with practical implementation and experiment in real environment. From the experiments, the authors find that the human tracking algorithm depend on the PIR sensors performs very well with proper sensor deployment.
In [7], the authors introduced an important implication for monitoring the boarding school students by using RFID technology. Although the project cannot control the punctuation of student but it can ease the workload of school management and save time.
The authors of [7] introduced a context-aware notification system for university students using RFID technology. This system is based on the student's matrix card as the RFID tag (sensor), RFID reader and server as the processors and screen monitor at the different locations in the campus as the actuator of the output.
In [8], the authors proposed a system with RFID and sensor networks to guarantee the keeping quality of lowtemperature logistics. The third technology based network and Global Positioning System (GPS) transportations are incorporated to this system to create a full-time monitoring system.
In this paper, an efficient monitoring system has been proposed. The aim of the presented system is to detect the targets within a specific covered area using the RFID technology and then control the operation of monitoring cameras. The proposed system reduces the consumed power and storage capacity by managing the operation of the cameras to be working at specific times.

DESIGN OF THE PROPOSED SYSTEM
The design of the proposed monitoring system includes three parts:

System Description
The designed scheme of the proposed monitoring system is introduced in Figure (1). The proposed building is assumed to contain four cells. Each cell is (5X5) meters and each of which contains two cameras placed in the opposite corners. In addition, each cell is covered by three detectors. The cameras work with the opposite detector to ensure the maximum coverage. The detectors have been configured with range 5 meters, height 2 meters, and beam width 24 degree.

The Proposed Algorithm
As shown in Figure (2), the proposed algorithm starts with initiating all included components in the covered area to be ready. The detector works on sending signals continuously. Whenever the object has been entered in the covered area, the tag receives the signal from the detector and transmits the related ID to the detector as an acknowledgment signal. After receiving the information from the tag, the command is sent to open camera. The detector has been assumed to send the information of the underlying tag combined by picture or video stream to the control center through wireless technology. The proposed algorithm calculates the power consumption and storage saving. D e c e m b e r 0 5 , 2 0 1 5

Software Selection
Choosing the software to implement the proposed algorithm is an important issue. The proposed system contains numerous graphics and movements as well as many calculations must be implemented during the system operation which requires software that supporting this side. Therefore, Microsoft Visual Studio is selecteddue to the included featuresandcharacteristics. D e c e m b e r 0 5 , 2 0 1 5

Covered Area
Yes Figure (2) The Proposed Algorithm

SIMULATION SETUP
The monitoring system consists of different challenges, such as power consuming, cost, and storage capacity. The proposed monitoring system is designed, as shown in Figure (1), to work at low power consuming and small storage capacity in comparison with the conventional monitoring system as well as tracking tasks.

Control Center
No D e c e m b e r 0 5 , 2 0 1 5 The simulation environment that designs the monitoring scheme has been built in Microsoft visual studio. The operation power of each camera is assumed to be 10 wattand the storage capacity is assumed to be 270 Mbyte/hour [10].The cameras considerbeing idle in this system, at the time of no detection for any subject. Therefore, the cameras will turn on whenever the object is detected.
The General User Interface (GUI) of proposed system contains the main window as shown in Figure (3). Whenever the target is being inside the cell and has been detected, the system automatically calculates the power consuming and storage capacity as shown in the field of (power consumed and storage) in this figure. The name and ID of the detected target is appeared in the Detected and Target fields.

Figure (3) GUI of the Proposed System
The main window of the GUI contains many functions, such as (FILE, Set, and Play). The first menu item is FILE which contains the exit option, the second menu item is play to start and pause the simulation. Additionally, the third menu item is SET which contains many settings of the simulation listed below: Targets:As shown in Figure (4), the target can be added, updated and deleted. After adding the target, the simulation program generates unique ID and code for each target, and then sets the target name, starting point of movement and setting the path. Update can change the path, name and position of starting target movement, while Delete button removes the target from the simulation. Detectors: this window used for adding, deleting, or updating the detectors settings, as shown in Figure (5). When adding a new detector, we must enter its specifications which are the range of covering, beam width, the location of the detector, bearing of antenna in degrees, power consumed and storage when target enters the area, and with which camera that detector will work as shown in Figure (6).

Figure (6) Adding Detector Window
Cams: the Cams window can be used for the setting of cameras in terms of adding, deleting and updating actions, as shown in Figure (7). When adding a camera, we must specify its location. The simulation automatically links the detector with camera as defined in detectors window.
Room: the dimensions of room are set, as shown in Figure (

WORKING SCENARIO
In order to test the proposed system, a working scenario has been assumed. In this scenario, four objects enter the building (covered area) and move between the cells from different entries as shown in Figure (9).This scenario is designed based on random paths that the four objects can choose to move inside each cell. This is to ensure that all cameras are turned on. Figure (10) shows the operation of cameras and detectors in each cell of the proposed system for this scenario.Two tables have been considered. Table (1) describes the consumedand saved power in this scenario. Table (2 It is noted from the above tables the amount of saving in consumed power and capacity storage of the proposed system in comparison with the traditional systems. In addition, these tables prove the efficiency of the proposed system. This is in terms of covered area and operation of object detection as well as the saving in power and storage capacity consumed.