نتایج جستجو برای: فناوری rfid
تعداد نتایج: 25932 فیلتر نتایج به سال:
RFID is currently considered a hot topic in the IT arena. It is described as major enabling technology for automated contact less wireless data collection and as an enabler for the real-time enterprise, a future vision of Enterprise Information Systems. But little is known about the perceived strategic importance of RFID among IT decision makers, current RIFD usage and areas of application or c...
RFID holds the promise of real-time identifying, locating, tracking and monitoring physical objects without line of sight, and can be used for a wide range of pervasive computing applications. To achieve these goals, RFID data have to be collected, transformed and expressively modeled as their virtual counterparts in the virtual world. RFID data, however, have their own unique characteristics –...
Ben Clacy and Brian Jennings presented their recently published paper with the title of “service management: driving the future of IT” [1], which highlighted service oriented is very important. How is the situation of RFID systems? There is a proliferation of RFID systems – tags, sensors, readers, middleware and applications each attempting to solve a specific business need. RFID technology can...
In the implementation of Radio Frequency Identification (RFID) systems concerns have been raised regarding information security and violations of end-user privacy. There is a large collection of literature available on efficient and inexpensive cryptographic engines, but they are still extravagant solutions for low cost RFID systems. Security and privacy provided by low cost RFID is both direct...
RFID technology is an area currently undergoing active development. An issue, which has received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of RFID technology. Most of this attention, however, has focused on related privacy issues. The goal of this chapter is to present a more global overview of RFID threats. This can not only help experts perform r...
Using electromagnetic coupling, an RFID tag can get power supplier by a reader and communicate with it for data exchange. Because the RFID system enables non-contact communication, various services and applications including the management of a library catalogue are possible. However, the system is affected easily by neighboring environment and the resonant frequency, thus the communication per...
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation technology in the ubiquitous computing domain. In this paper we present various sources of error in passive RFID systems, which can make the reliable operation of RFID augmented applications a challenge. To illustrate these sources of error, we equipped playing cards with RFID tags and measured the...
PROTECTING PRIVACY AND ENSURING SECURITY OF RFID SYSTEMS USING PRIVATE AUTHENTICATION PROTOCOLS Md. Endadul Hoque Marquette University, 2010 Radio Frequency IDentification (RFID) systems have been studied as an emerging technology for automatic identification of objects and assets in various applications ranging from inventory tracking to point of sale applications and from healthcare applicati...
A novel method to infer interactions with passive RFID tagged objects is described. The method allows unobtrusive detection of human interactions with RFID tagged objects without requiring any modifications to existing communications protocols or RFID hardware. The object motion detection algorithm was integrated into a RFID monitoring system and tested in laboratory and home environments. The ...
This paper proposes a novel type of RFID application, i.e., RFID seeking. Several existing types of RFID applications such as monitoring, searching, locating/navigating, are similar with RFID seeking. However, they are either inapplicable or vulnerable for RFID seeking scenarios, in which a user is to find a lost tagged item in a blind spot, or to find a wanted item among a mass of similar ones...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید