نتایج جستجو برای: radio frequency identification
تعداد نتایج: 935469 فیلتر نتایج به سال:
The successful implementation of any innovation requires an understanding of its benefits and costs. This study examines the changes in the magnitude of costs and benefits associated with technology process innovation adoption as the innovation diffuses across different industries. Using RFID as an exemplar technology, the study shows that the magnitude of benefits and costs associated with tec...
CONTENTS 32.
In this paper, a low-frequency RFID location system based on a matrix of quad antennae placed under a floor surface is described. A prototype system was used for parameterisation and feasibility tests. The results show that it is possible to build a location system using floor quad antennae.
We developed a tangible entertainment system that enables to play video game with physical collectibles as game components. It consists of a capsule toy vending machine with LCD panel, capsule toys with embedded RFID tags, an RFID sensor board and a computer. Nowadays a huge amount of collectibles is sold: baseball cards, dollhouse miniatures, character figures, candy tins, and so on. Usually, ...
Background RFIDs have almost become ubiquitous such that one can find RFID readers installed in almost any location. These RFIDs follow a well-established protocol, Fig. 1, that is built on the fact that the RFID tags perform very simple processing that require very little power. Thus, the RFID tags do not have to perform any complex storage of energy and it is assumed it can perform all of the...
Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage processes, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the i...
The MIFARE Classic is the most popular RFID chip, used in public transport as well as cafeterias and other applications. This paper gives an overview of which methods were used to re-engineer the chips, from polishing to analyzing the communication. Within this process, various security weaknesses were discovered. Those allow various attacks, which will be shown in the last part of the paper.
This paper describes a metal mount RFID tag that works reliably on metallic surfaces. The method proposes the use of commercial label type RFID tags with 2.5 mm thick Styrofoam103.7 with a relative permittivity of 1.03 attached on the back of the tag. In order to verify the performance of the proposed method, we performed experiments on an electric transformer supply chain system. The experimen...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید