Research of Organic Vegetables Safety Traceability System in Agricultural Enterprise Based on RFID Technology

Article Preview

Abstract:

Taking full advantages of RFID technology relative to barcode, we collect the data of every link of organic vegetables including breeding, growing, fertilizing, farming, inspecting, harvesting, logistics and distribution. In view of the agricultural enterprises own characteristics, we develope the organic vegetables safety traceability system. In this system, not only can our customers take part in every link of organic vegetables traceabilty, but also purchase all kinds of rest asured organic vegetables online. The agricultural enterprise can also monitor each link of the organic vegetables. Linking to the governmental food security management platform, the system will not only enhance the food security management level, but also promote the healthy development of the agricultural industry.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

473-476

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] XIAO Jing, LIU Zi-yu and LI Bei-wei: Journal of Agricultural Mechanization Research Vol. 34(2012), pp.181-184.

Google Scholar

[2] KANG Dong: Radio frequency identification (RFID) core technology and typical application development cases (POSTS & TELECOM PRESS, Beijing 2008).

Google Scholar

[3] Information on http: /traceability. mofcom. gov. cn.

Google Scholar

[4] ZENG Yi: Hubei Agriculture Science Vol. 50(2011), pp.2736-2739.

Google Scholar

[5] EPCglobal Alliance. EPCgloba1 Tag Data Standards Version 1. 3[J]. EPCglobal Inc, 2006: 9-12.

Google Scholar

[6] GUO Jian-hong, QIAN Lian-wen: Journey of Wuhan University of Technology Vol. 32(2010), pp.110-113.

Google Scholar

[7] YANG Shi-jiang, LIU Jin-gao: Information Technology Vol. 8 (2011), pp.144-145.

Google Scholar

[8] CHEN Zeng-xiang: Information Security and Technology Vol. 3 (2012), pp.32-34.

Google Scholar

[9] LU Jun-wei, CHANG Lin and CHEN Yun-kun: Computer Knowledge and Technology Vol. 6(2010), p.5160.

Google Scholar