Soft Radio-Frequency Identification Sensors: Wireless Long-Range Strain Sensors Using Radio-Frequency Identification
نویسندگان
چکیده
منابع مشابه
Radio Frequency Identification Sensors
RFID systems have been used in numerous applications like asset tracking, toll collection and libraries. The following paper presents our ongoing research for the Auburn University Detection and Food Safety (AUDFS) project to use RFID technology combined with sensors for detection of pathogens in food. AUDFS aims to integrate the breakthroughs in the detection of food borne illnesses with advan...
متن کاملRadio frequency identification.
Radio frequency identification (RFID) is a group of technologies used to identify or track electronic devices (RFID tags or transponders), typically applied to or incorporated into products, animals, or even persons, using radio waves or electromagnetic fields. RFID systems have various applications, with the most prevalent one being enterprise supply chain management to improve the efficiency ...
متن کاملRadio Frequency Identification
DEFINITION Radio Frequency Identification (RFID) exists as a distinct subset of the larger family of automated identification technologies that includes things like bar codes, visual scanning devices and biometric readers. RFID is a means of automated identification that features electronic tags used both to store data and to act as transponders for sending the stored data as the payload in ele...
متن کاملRadio Frequency Identification (RFID)
Radio Frequency Identification (RFID) is a technology that has been in use since the 1940’s; however, practical business applications are more recently being developed. Dell Computers looked at their Xiamen, China manufacturing facility to see if RFID technology could result in improved efficiencies with quick payoff. The resulting scorecard showed areas within their facility that RFID technolo...
متن کاملUnique Identification of Radio Frequency Identification Tags
Radio Frequency Identi cation (RFID) tags are used in credit cards and passports for automatic identity recognition and expense transfers as well as throughout the supply chain to track inventory. The unauthorized electronic reproduction of these RFID signals is easily performed despite the use of developed encryption methods and can lead to critical security breaches and lost inventory. A meth...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Soft Robotics
سال: 2019
ISSN: 2169-5172,2169-5180
DOI: 10.1089/soro.2018.0026