• Users Online: 365
  • Home
  • Print this page
  • Email this page
Home About us Editorial board Search Ahead of print Current issue Archives Submit article Instructions Subscribe Contacts Login 


 
 Table of Contents  
REVIEW ARTICLE
Year : 2015  |  Volume : 3  |  Issue : 5  |  Page : 1-5

Radio frequency identification and rescue victims in earthquake


1 Department of Health and Medical Sciences Research, Research Institute of Shakhes Pajouh, Isfahan, , Isfahan, Iran
2 Department of Health Information Technology and Management, School of Medical Management and Information Sciences, Isfahan University of Medical Sciences, Isfahan, Iran

Date of Web Publication29-Oct-2015

Correspondence Address:
Sima Ajami
Department of Health Information Technology and Management, School of Medical Management and Information Sciences, Isfahan University of Medical Sciences, P. O. Box: 81745-346, Isfahan
Iran
Login to access the Email id

Source of Support: None, Conflict of Interest: None


DOI: 10.4103/2347-9019.168566

Rights and Permissions
  Abstract 

Radio frequency identification (RFID) system has been successfully applied to the areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services. The RFID is already used to track and trace the victims in a disaster situation. Data can be collected in real time and be immediately available to emergency personnel and saves time by the RFID. The aim of this study was to express the role of the RFID technology in an earthquake to rescue victims. This study was a unsystematic review which the literature search was conducted with the help of libraries, books, conference proceedings, databases, and also search engines available at Google, Google Scholar. We employed the following keywords and their combinations; RFID, the victim, disaster, rescue, and earthquake in the searching areas of titles, keywords, abstracts, and full texts. This article presents two aspects of usage RFID; advantages and barriers. More than 60 articles were assessed, and 39 of them selected based on their relevancy. This literature review helps define the concept of “Tracking victims via RFID” (in terms of both advantages and barriers) as the new technology in the present age.

Keywords: Earthquake, radio frequency identification, rescue, technology, victim


How to cite this article:
Akbari B, Ajami S. Radio frequency identification and rescue victims in earthquake. Int J Health Syst Disaster Manage 2015;3, Suppl S1:1-5

How to cite this URL:
Akbari B, Ajami S. Radio frequency identification and rescue victims in earthquake. Int J Health Syst Disaster Manage [serial online] 2015 [cited 2019 Mar 21];3, Suppl S1:1-5. Available from: http://www.ijhsdm.org/text.asp?2015/3/5/1/168566


  Introduction Top


Iran, because of extensive, geographical situation, and climate varies, is one of the disaster prone countries of the world. Natural disasters, for example earthquake, as an unexpected event that cause damage and destruction of human life and health, and the injured persons without others assistance are not able to meet their needs. Earthquakes in Iran and neighboring regions (e.g. India, Turkey, and Afghanistan) are closely connected to their position within the geologically active Alpine-Himalayan belt. Earthquake crises disrupt all daily affairs of society, such as economic activities, city services, communication systems and community services, and public health.[1],[2] RFID is an acronym for “radio frequency identification” and refers to a technology whereby digital data encoded in RFID tags or smart labels are captured by a reader via radio waves. RFID belongs to a group of technologies referred to as Automatic Identification and Data Capture (AIDC). The AIDC methods automatically identify objects, collect data about them, and enter those data directly into computer systems with little or no human intervention.[3] The RFID is a technology which utilizes radio waves for collecting and transferring data, with the capability of sending and receiving information without human involvement.[4] The RFID is a wireless technology capable of automatic and unambiguous identification without line of sight by extracting a unique identifier from microelectronic tags attached to objects.[5] The RFID is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag attached to an object, through a reader for the purpose of identifying and tracking the object, animal, and people. The RFID is already used to track and trace the victims in a disaster situation. Data can be collected in real time and be immediately available to emergency personnel and saves time by the RFID. Crisis management teams, hospitals, and emergency personnel, have access to data through a computer database.[6],[7],[8] The RFID was the first explored in 1940s as a method to identify allied airplanes.[9] Today, the RFID system have been successfully applied to the areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few.[10] The most RFID systems consist of tags that are attached to the objects to be identified. Each tag has its own “read only” or “rewrite” internal memory depending on the type and application. A typical configuration of this memory is to store product information, such as an object's unique ID manufactured date, etc. The RFID reader generates magnetic fields that enable the RFID system to locate objects (via the tags) that are within its range. The high frequency electromagnetic energy and query signal generated by the reader triggers the tags to reply to the query; the query frequency could be up to 50 times/s. As a result communication between the main components of the system, that is, tags and reader are established. As a result, large quantities of data are generated. Supply chain industries control this problem by using filters that are routed to the backend information systems. In other words, to control this problem, software such as Savant is used. This software acts as a buffer between the IT and the RFID reader.[11] The RFID system consists of various components which are integrated in a manner defined in the above section. This allows the RFID system to follow the objects (tag) and perform various operations on it. The integration of the RFID components enables the implementation of an RFID solution.[12]

The RFID system consists of following five components:

  • Tag (attached to an object, unique identification);
  • Antenna (tag detector, creates magnetic field);
  • Reader (receiver of tag information, manipulator);
  • Communication infrastructure (enable reader/RFID to work through IT infrastructure);
  • Application software (user database/application/interface).[13]


The RFID systems work much like any other radio frequency system. The receiving antenna picks up a signal in the form of radio waves from an object that is sending out the signals. In identification systems, the transponder is an RFID tag that communicates with the antenna and the equipment that decodes the information. Because of the reduced size and the remarkable technology such an ID tag can be programmed and used for long periods of time. If a person carrying or wearing an RFID tag approaches a building or other location where the antenna is in place the signal is received by the antenna. With an active tag, the person does not have to be as close as he or she would with a passive tag. Active tags have an additional power source. Even if the RFID tag is inside clothing or otherwise covered it may be “read” by the receiving equipment. This identification, based on information on the tag, happens in much less than a second. Several tags approaching the receiving station can be “read” and identified at almost the same time. This is one of the keys to protecting retail stores and other businesses. RFID tags can be attached to products to prevent shoplifting. These tags have to be deactivated by store personnel so you can leave the store without setting off the alarm.[14] One of the problems that government and rescuers are facing is to identify and follow victims after saving them under debris after earthquake occurrence. Recording, storing, and retrieving victims' data in information systems can provide useful information to supply:

  • Shelters;
  • Food and water;
  • Sanitary equipment (bath, toilet);
  • Clothes;
  • Rehabilitation and temporary healthcare services;
  • Human resources (doctor, nurse, rescuer);
  • Drug and pharmaceutical instrument;
  • Burial place for corpses;
  • Publicize victims' relatives and friends;
  • Burial trash management;
  • Logistics management;
  • Dispatch injured victims;
  • Stocks for victim needs.


In an earthquake, there were a lot of barriers such as network disconnection, fix phone and cell phone unavailable, to track and find victims. Therefore, to rescue victims who had the RFID tags before an earthquake or not, it would be useful to rescue them by using this technology. Therefore, the aim of this study was to introduce the RFID technology and explain how it can rescue victims who saved from collapsed building after an earthquake.


  Methods Top


This study was a unsystematic review which the literature on the role of the RFID technology in natural disasters to rescue victims on a formal research framework. Our study was divided into three phases: Literature collection, assessing, and selection. The literature was searched on the role of RFID technology in improving patient safety with the help of libraries, books, conference proceedings, databases, and also search engines available at Google, Google Scholar. In our searches, we employed the following keywords and their combinations; RFID, victim, disaster, rescue, and earthquake in the searching areas of titles, keywords, abstracts, and full texts in the searching areas. More than 60 articles were collected and assessed, and 39 of them were selected based on their relevancy.


  Results Top


RFID could be used immediately after of a major earthquake to save lives, according to new research published in the International Journal of Innovation and Sustainable Development.

We can divide victims into two groups; (a) victims have had RFID tag before the earthquake, (b) victims did not have an RFID tag before the earthquake [Figure 1].
Figure 1: Conceptual map of role the radio frequency identification to rescue victims after earthquake

Click here to view


Victims have had radio frequency identification tag before the earthquake

Wu of the National Sun Yat-Sen University and Hung, of the National Kaohsiung First University of Science and Technology, in Taiwan, said that there is a “golden” rescue period following an earthquake, which lasts just 72 h. During this key time, rescuers can decrease side effects of the possibility of aftershocks and continued risk caused by collapsing buildings, fires, and gas explosions. In addition, to rescue people who had RFID tag before earthquake such as people and visitors in hospitals or schools, or some organizations would have their identity badges embedded in their RFID tags, to recognize how many people are present in these collapsed buildings. The researchers declared that they have used the Sichuan earthquake (magnitude 8.0) of May 2008. 100 magnitude 4.0 aftershocks hit the area following the disaster as a model for studying how RFID might be used in such a situation. However, the concepts would be equally applicable to other disasters.[15]

Victims have not had a radio frequency identification tag before the earthquake

  • Japanese rescue workers experienced difficulties of finding victims in Japan Niigata prefecture in 2004. The earthquake might be causing a wired network disconnection, fixed phone, and cell phone services. In fact, victims could not answer the phone, because, their houses had collapsed due to the earthquake. Thus, we may not be able to keep in contact with victims by using the usual tools of communication in time of disaster. The Japanese Ministry of Internal Affairs and Communication is considering choosing one of the several methods. One of the methods is to discover victims use RFID with computer sensors. If the ministry chooses the RFID plan, then the sensing devices would be scattered helicopter evenly over the affected area of the high intensity earthquake. The devices would trigger their RFID to establish a self-organized network to pinpoint the location of victims. The RFIDs with temperature and voice sensors can sense the victim's existence by their body heat and voice to the rescue of injured and trapped victims. However, when victims cannot be located, we use trilateration to ascertain their exact position and find them [16]
  • Rescuers can connect the RFID tags to the victims after the earthquake to manage, estimate provides medical, health, and welfare equipment in a hospital and shelter area.


The researchers also showed the advantages and barriers use the RFID to track victims as follows:

Advantages

  • Reduce time and cost by using RFID [17],[18] in the process of victims tracking;
  • Reduce errors to recognize and track victims by using RFID;[17],[18]
  • Localize the victims in shelters;[19],[20],[21]
  • Rescue victims faster;[13],[19]
  • Give better services to victims;[19]
  • Decrease wasting time to rescue victims;[19]
  • Decrease making mistakes through data collection;[22]
  • Reduce victims' information analysis time;[18],[22]
  • Improve victims' logistics for tracking and servicing;[22],[23],[24]
  • Improve communication among doctors, nurses, and rescuers;[22]
  • Increase quality of care and decrease human errors;[18],[25],[26]
  • Reduce possible risks and threats;[18]
  • Facilitate medical and supportive data recording;[27]
  • Increase monitoring and enhancing victims' safety;[17],[28]
  • Track and identify victims from various distances;[24]
  • Increase speed of recognizing victims of information system;[18]
  • Reduce time and information processing;[18]
  • Increase security data and information;[29]
  • Ability to read several tags simultaneously.[30]


Barriers

There are many significant barriers to use RFID device for tracking victims after the earthquake as follows:

  • It is impossible to read wet tags;[31],[32]
  • Vulnerability tags; when they get wet;[33]
  • Tags and reader interaction;[34]
  • The issue of safety (lower security than the barcode),[35]
  • Economic problems due to the high cost with the RFID;[36]
  • Hardware RFID problems;[37],[38]
  • Accredited standards development;[39]
  • There is an ethical and moral dimension to tagging human.[15]



  Conclusions Top


Organizational resources and technical structures such as hardware and software are very essential requirements in the redesign of electronic projects. The RFID makes the prevention about the human error of medicine, easy, and fast access to medical staff, equipment, medicine. It is cost effectiveness. All of these factors cause to increase the quality and quantity of care in the healthcare sector.

Financial support and sponsorship

Nil.

Conflicts of interest

There are no conflicts of interest.

 
  References Top

1.
Ajami S, Fatahi M. The role of earthquake information management systems (EIMSs) in reducing destruction: A comparative study of Japan, Turkey and Iran. Disaster Prev Manage 2009;18:150-61.  Back to cited text no. 1
    
2.
Ajami S. The Role of Earthquake Information Management System to Reduce Destruction in Disasters with Earthquake Approach. In Dr. John Tiefenbacher (Editor). Approaches to Disaster Management - Examining the Implications of Hazards, Emergencies and Disasters. Croatia: INTECH; 2013:131-44. Available from: http://www.intechopen.com/books/approaches-to-disaster-management-examining-the-implications-of-hazards-emergencies-and-disasters. [Last accessed on 2014 Sep 14].  Back to cited text no. 2
    
3.
American Barcode and RFID. How Does RFID Work? 2013. Available from: http://www.abrfid.com/how-does-RFID-work. [Last accessed on 2014 Feb 10].  Back to cited text no. 3
    
4.
Ajami S, Arab-Chadegani R. What are the most important barriers to implementing radio frequency identification device (RFID) in healthcare system? J Inf Technol Softw Eng 2013;S7:E004.  Back to cited text no. 4
    
5.
Wu Y, Ranasinghe DC, Sheng QZ, Zeadally S, Yu J. RFID enabled traceability networks: A survey. Distrib Parallel Databases 2011;29:397-443.  Back to cited text no. 5
    
6.
Ajami S, Carter MW. The advantages and disadvantages of radio frequency identification (RFID) in health-care centers; approach in emergency room (ER). Pak J Med Sci 2013;29: 443-8.  Back to cited text no. 6
    
7.
Ajami S. A comparative study on earthquake information management systems (EIMS) in India, Afghanistan and Iran. J Educ Health Promot 2012;1:27-34.  Back to cited text no. 7
    
8.
Ajami S, Rajabzadeh A. Radio Frequency Identification (RFID) technology and patient safety. J Res Med Sci 2013;18:809-13.  Back to cited text no. 8
[PUBMED]  Medknow Journal  
9.
Landt J. The history of RFID. IEEE Potentials 2005;24:8-11.  Back to cited text no. 9
    
10.
Nambiar AN. RFID Technology: A Review of its Applications. Paper Presented at the World Congress on Engineering and Computer Science. Vol. II. WCECS, October 20-22, 2009, San Francisco, USA; 2009.  Back to cited text no. 10
    
11.
Ahsan K, Shah H, Kingston P. RFID applications: An introductory and exploratory study. Int J Comput Sci Issues 2010;7:1-7.  Back to cited text no. 11
    
12.
Ahsan K. RFID components, applications and system integration with healthcare perspective. In: Turcu C, editor. Deploying RFID – Challenges, Solutions, and Open Issues. InTech.; 2011. Available from: http://www.intechopen.com/books/deploying-rfid-challenges-solutions-and-open-issues/rfid-components-applications-and-system-integration-with-healthcare-perspective. [Last Accessed on 2014 Feb 10].  Back to cited text no. 12
    
13.
Sarbadhikari A. Radio-frequency Identification (RFID) and Its Application; 2011. Available from: http://www.brainwareknowledgehub.com/content/?p=104. [Last accessed on 2013 Feb 10].  Back to cited text no. 13
    
14.
The Gemini Geek. How RFID Works? 2013. Available from: http://www.thegeminigeek.com/how-rfid-works/. [Last Accessed on 2014 Feb 10].  Back to cited text no. 14
    
15.
Wu YCJ, Hung CY. The use of RFID technology in earthquakes. Int J Innov Sustain Dev 2009;4:253-75.  Back to cited text no. 15
    
16.
Daito M, Tanidan N. How Can RFID Contribute to Disaster Rescue? 2005. p. 62. Available from: http://www.rcss.kansai-u.ac.jp/DPS/pdf/dp062.pdf. [Last accessed on 2013 Apr 10].  Back to cited text no. 16
    
17.
Yao W, Chu CH, Li Z. The Use of RFID in Healthcare: Benefits and Barriers. RFID-Technology and Applications (RFID-TA), 2010 IEEE International Conference; 2010. p. 128-34.  Back to cited text no. 17
    
18.
Ataro B. Advantages and Disadvantages of RFID Engineering. n.d. Available from: http://www.blogotaro.blogas.lt/advantages-and-disadvantages-of-rfid-engineering-188.html. [Last accessed on 2013 Nov 11].  Back to cited text no. 18
    
19.
Vemula DT, Yu X, Ganz A. Real time localization of victims at an emergency site: Architecture, algorithms and experimentation. Conf Proc IEEE Eng Med Biol Soc 2009;2009:1703-6.  Back to cited text no. 19
    
20.
Robocup Rescue. Rescue Robots Freiburg 2006. n.d. Available from: . [Last accessed on 2013 Jun 07].  Back to cited text no. 20
    
21.
Chen C. Design of a child localization system on RFID and wireless sensor networks. J Sens 2010; 2010:1-8. doi:10.1155/2010/450392.  Back to cited text no. 21
    
22.
Garcia V, Tall I. RFID in healthcare. Workshop in the 2006 Canadian RFID Conference Set to Explore Latest Developments. Markham, Ont. April 4-5, 2006. Available from: http://www.rfidcanada.com/2006Conference/WORKSHOP%20HEALTHCARE.pdf. [Last accessed on 2013 Jan 22].  Back to cited text no. 22
    
23.
U.S. Food and Drug Administration. Radiofrequency Identification (RFID). n.d. Available from: . [Last accessed on 2014 Sep 22].  Back to cited text no. 23
    
24.
Activewave. Advantages of RFID. n.d. Available from: http://www.activewaveinc.com/technology_rfid_advantage.php. 2009. [Last accessed on 2014 Sep 22].  Back to cited text no. 24
    
25.
Bell. RFID Solutions. n.d. Available from: http://www.bell.ca/enterprise/EntPrd_Wireless_RFID_Solutions.page. [Last accessed on 2014 Jan 12].  Back to cited text no. 25
    
26.
Prabhakar S. Mayo Clinic Researchers, Study Tackle Labeling Errors. American Society of Registered Nurses, Chronicle of Nursing; 2008. Available from: . [Last accessed on 2013 Nov 01].  Back to cited text no. 26
    
27.
Panos R, Freed T. The Benefits of Automatic Data Collection in the Fresh Produce Supply Chain. In Proceeding at Automation Science and Engineering, 2007. CASE 2007. IEEE International Conference on 22-25 Sept. 2007: in Scottsdale, AZ : P1034 - 1038. Available from: . [Last accessed on2014 Sep 14].  Back to cited text no. 27
    
28.
García-Betances RI, Huerta MK. A review of automatic patient identification options for public health care centers with restricted budgets. Online J Public Health Inform 2012;4. pii: Ojphi.v4i1.4011.  Back to cited text no. 28
    
29.
Arnaud M. RFID Security and Privacy; 2013. Available from: http://www.halshs.archives-ouvertes.fr/docs/00/63/70/61/PDF/RFID_chapter_v9.pdf. [Last accessed on 2013 Jan 22].  Back to cited text no. 29
    
30.
Large Enterprise Business. RFID and Privacy. n.d. Available from: http://www.hp.com/canada/portal/enterprise/downloads/rfid-healthcare.pdf. [Last accessed on 2013 Feb 22].  Back to cited text no. 30
    
31.
Omni-id.com. Best Practices Guide– Rfid Implementation, Testing and Deployment. n.d. Available from: . [Last accessed on 2013 Jan 25].  Back to cited text no. 31
    
32.
Adaptalift. RFID VS BARCODES: Advantages and Disadvantage Comparison. n. d. Available from: . [Last accessed on 2013 May 01].  Back to cited text no. 32
    
33.
All BARCODE Systems. Microscan to Showcase New Barcode and Machine Vision Products/What are the advantages and disadvantages of RFID? n.d. Available from: . [Last accessed on 2013 Jan 22].  Back to cited text no. 33
    
34.
Cheon JH, Hong J, Tsudik G. Reducing RFID Reader Load with the Meet-in-the-Middle Strategy. Journal of communication and networks 2012;14:10-14. Available from: . [Last accessed on 2013 Feb 25].  Back to cited text no. 34
    
35.
Junker N. What is RFID and is it Safe? 2012. Available from: . [Last accessed on 2013 Feb 22].  Back to cited text no. 35
    
36.
Roussos G. Enabling RFID in retail. IEEE Comput 2006;39:25-30. Available from: . 25-30. [Last accessed on 2013 Mar 05].  Back to cited text no. 36
    
37.
UK RFID. RFID tags. n.d. Available from: . [Last accessed on 2014 Jan 05].  Back to cited text no. 37
    
38.
Blonder Y. The problem with software packages developed by RFID hardware vendors. RFID J 2011;March/ April 5. Available from: . [Last accessed on 2013 Mar 28].  Back to cited text no. 38
    
39.
AIM. Standards Organizations. n.d. Available from: . [Last accessed on 2013 Feb 05].  Back to cited text no. 39
    


    Figures

  [Figure 1]



 

Top
 
 
  Search
 
Similar in PUBMED
   Search Pubmed for
   Search in Google Scholar for
 Related articles
Access Statistics
Email Alert *
Add to My List *
* Registration required (free)

 
  In this article
Abstract
Introduction
Methods
Results
Conclusions
References
Article Figures

 Article Access Statistics
    Viewed2165    
    Printed42    
    Emailed0    
    PDF Downloaded2905    
    Comments [Add]    

Recommend this journal


[TAG2]
[TAG3]
[TAG4]