نتایج جستجو برای: اسیلاتورحلقه ای برای کاربرد های rfid

تعداد نتایج: 653152  

2014
Seungjae Shin Burak Eksiouglu

Ten years have passed since Wal-Mart’s public announcement about its RFID technology adoption plan in 2003. There has been a slowdown of RFID technology adoption since 2008. Many U.S. retailers do not consider adopting the RFID technology because of the uncertainty of return on investment and the lack of business cases. This paper evaluates labor productivity of RFID adopted retailers. This pap...

Journal: :Pervasive and Mobile Computing 2006
Melanie R. Rieback Patrick N. D. Simpson Bruno Crispo Andrew S. Tanenbaum

This paper explores the concept of malware for Radio Frequency Identification (RFID) systems — including RFID exploits, RFID worms, and RFID viruses. We present RFID malware design principles together with concrete examples; the highlight is a fully illustrated example of a self-replicating RFID virus. The various RFID malware approaches are then analyzed for their effectiveness across a range ...

2007
Stephen A. Weis

Deployment of radio frequency identification (RFID) systems is rapidly growing and has the potential to affect many different industries and applications. We present a brief history of RFID technology and automatic identification systems. We summarize major RFID applications, and present a primer on RFID fundamental principles. Finally, we discuss several challenges and obstacles to RFID adopti...

2007
Uta Franziska Knebel Jan Marco Leimeister Helmut Krcmar

RFID-technologies have been described as major enabling technologies for automated, contactless data collection. We conveyed a quantitative survey of 463 executives across various industries in Germany to investigate about the perceived strategic importance of RFID among IT decision makers, current RFID usage, companies' intentions to invest in RFID and visions of RFID application. The survey r...

2009
Jerrel Leung Sung-Chi Chu Waiman Cheung

Supply chain management has two streams of strategies, namely lean and agile. However, current RFID applications tend to overlook supply chain strategies and are designed for obvious RFID applications, like simply replacing barcodes. However, the full potential of RFID might not be achieved when RFID applications are not aligned with the supply chain strategies. Therefore, this study analyzes t...

2007
Namje Park Seungjoo Kim Dongho Won

Recently, mobile RFID (Radio Frequency Identification) services such as in smart poster or supply chain are rapidly growing up as a newly generating industry. Here, mobile RFID service is defined as a special type of mobile service using RFID tag packaging object and RFID reader attached mobile RFID terminal. This paper is to provide an approach for ensuring RFID net-work security based on secu...

2006
Melanie R. Rieback Georgi N. Gaydadjiev Bruno Crispo Rutger F.H. Hofman Andrew S. Tanenbaum

This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platfor...

پایان نامه :وزارت بهداشت، درمان و آموزش پزشکی - دانشگاه علوم پزشکی و خدمات بهداشتی درمانی تهران 1355

چکیده ندارد.

ژورنال: :نشریه هیدرولیک 2015
محمد مهرزاد صلاح کوچک زاده محمد بی جن خان

مدول تیغه‏ای برای عبور دادن بده نسبتاً ثابت در دامنه‏ای از تغییرات سطح آب کانال ها معرفی شده است. طراحی آن بر ضریب بده تیغه ها و ارتفاع آبی -که کنترل جریان از تیغه ای به تیغه دیگر منتقل می شود- استوار است. این سازه، که می‏تواند نقش مؤثری در تحویل حجمی مناسب در شبکه های توزیع آب داشته باشد، معمولاً باید به صورت واحدهای موازی (مزدوج) نصب شود، اما تحقیقات و ضوابط طراحی که تاکنون منتشر شده است، برای ...

2016
Muhammad Tarmizi Lockman Ali Selamat

As the load of traffic increases in RFID middleware, RFID system can no longer manage the RFID tags. Because of the incapability of the RFID system to handle vast amount of RFID tags, there are possibilities that the data cannot be processed efficiently in the RFID middleware. Implementation of agent technology is useful for verification and validation in RFID system architecture because intell...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید