نتایج جستجو برای: reader to tag collision
تعداد نتایج: 10630264 فیلتر نتایج به سال:
Radio Frequency Identification (RFID) System admits rapid identification of entities by itself in the discipline of pervasive computing. RFID system comprises readers and tags. Readers are communicating with the tag by broadcasting RF signals. In existing RFID system channel assignment, tag identification and collision is a vital issue. Henceforth efforts are requisite to minimize these issues....
the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...
—Many RFID authentication protocols have been developed in recent years. However, most require the reader to search all tags in the system to identify a single tag. This problem makes the protocols impractical in large-scale RFID deployments. To address this problem, we propose a privacypreserving mutual authentication protocol for RFID systems with constant-time identification, based on Quadr...
Currently RFID (radio frequency identification) technology is pushing to the market mainly forced by industry. Passive tags in the UHF (ultra high frequency) region are of particular interest e.g. for supply chains, showing a tendency to become state of the art. Passive tags obtain their energy from the readers during communication. The reader has to power the tag by radiating energy at the sam...
Radio frequency identification (RFID) systems present an incredibly cost-effective and easy-to-implement solution to close-range localization. One of the important applications of a passive RFID system is to determine the reader position through multilateration based on the estimated distances between the reader and multiple distributed reference tags obtained from, e.g., the received signal st...
This paper proposes a novel approach to optimize the tag detection, coverage problem and power allocation issues of the RFID reader and tags. We have investigated the effects of variable localization of RFID tags from reader and power loss, inefficiency and distance constraints caused due to equal power allocations to the tags. As an improvement to the situation, implementation of adaptive algo...
Radio frequency identification (RFID), based on the MIT Auto-ID project [1], is a technology that uses wireless transmission to identify an object. RFID is seeing increased use in various industries as an alternative to the bar code. An RFID system consists of three components: the reader, the tag, and the back-end database. Some advantages of an RFID system are that it does not require direct ...
Design and Implementation Of Hardware And Software Systems For Object Tracking Using RFID Technology
-------------------------------------------------------------------ABSTRACT-------------------------------------------------------------Now a day’s mobile technology plays key role, in various environments identification of objects can be done manually, to improve the efficiency of an identification of objects we are using RFID tags. RFID tags track objects in supply chains, and are working the...
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access cont...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید