نتایج جستجو برای: فناوری rfid

تعداد نتایج: 25932  

2010
Namje Park

Mobile RFID environment means that mobile RFID devices like mobile (cellular) phone and PDA employing cellular network can be used at querying information of the consumer product related a tag. The mobile RFID devices should have mobile RFID readers which are made for them and are, in particular, compliant with EPC Class-1 Generation-2 UHF (860-960 MHz) standard. Ensuring the security of mobile...

Journal: :The Electronic Library 2007
Shien-Chiang Yu

Purpose – Radio frequency identification (RFID) applications that provide batch access, storage mass data and reprogramming are better than barcodes. Applying RFID can promote operational efficiency and precision. The cost is one of the major factors influencing whether or not RFID will be accepted in libraries. Although RFID has improved the efficiency of libraries, the essence of the library ...

2009
Haipeng Zhang Wooseok Ryu Md. Kafil Uddin Bonghee Hong

RFID technology enables a new era of business optimization. With the development of RFID technology, more and more RFID applications have been developed. In RFID system, RFID middleware collects, filters, and integrates large volume of streaming data gathered continuously by heterogeneous readers to process queries from applications. These queries are called continuous queries as they are execu...

Amir Mehdi Ghazifard Arash Shahin

Abstract While Computerized Maintenance Management System (CMMS) enables maintenance managers and supervisors to access information about equipment, manpower and maintenance policies, there is still a need to facilitate getting data/information into the backend database where it can be utilized by the organization as information to make decisions regarding the operation of the organization. Si...

Ailin Sadeghi Sarvestani Mehran Salehi Shahrabi

In according to quantity of various consumption materials in construction sites of complex projects such as oil industry, infrastructure, and large scale commercial, management and monitoring of materials can affect on the final time and cost of project’s activities. In today’s world of rising labor costs and labor shortages, automated materials tracking can provide some advantage to impr...

2014
Raghuvir Songhela Manik Lal Das

Radio Frequency IDentification (RFID) systems are gaining enormous interests in industry due to their vast applications such as supply chain, access control, inventory, transport, health care and home appliances. Although tag identification is the primary security goal of an RFID system, privacy issue is equally, even more important concern in the RFID system because of pervasiveness of RFID ta...

Journal: :Interfaces 2007
Nishtha Langer Chris Forman Sunder Kekre Alan Scheller-Wolf

As many manufacturers, retailers, distributors, and logistics firms adopt RFID, the technology is becoming pervasive in the supply chain. Although its advocates include retail giants such as Wal-Mart, not all companies are enthusiastic about its benefits. It is not clear whether RFID is a boon or a curse to the supply chain—its market growth may just be an issue of compliance. To establish the ...

2015
Yunmin Kim Ji Hyoung Ahn Tae-Jin Lee

Computation RFID (CRFID) expands the limit of traditional RFID by granting computational capability to RFID tags. RFID tags are powered by Radio-Frequency (RF) energy harvesting. However, CRFID tags need extra energy and processing time than traditional RFID tags to sense the environment and generate sensing data. Therefore, Dynamic Framed Slotted ALOHA (DFSA) protocol for traditional RFID is n...

2007
Thomas Hollstein Manfred Glesner Henk Birkholz Karsten Sohr

RFID technology is an emerging market with a wide spectrum of application domains. The introduction of RFID systems in industrial manufacturing has already been taken up more than ten years ago. Currently RFID tags are appearing in public environments like ticketing applications and retail supply chains. One the one hand mass applications will imply a break-through for RFID technologies, on the...

2018
Hazalila Kamaludin Hairulnizam Mahdin Jemal H Abawajy

Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید