نتایج جستجو برای: rfid applications

تعداد نتایج: 616818  

Journal: :Advances in Computers 2008
George Roussos

Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple physical entities and digital information. In this survey, we cater to the computing professional who is not familiar with the specifics of rfid which we discuss in the context of supply chain management, its most popul...

Journal: :J. Network and Computer Applications 2014
Wei Xie Lei Xie Chen Zhang Qiang Wang Jian Xu Quan Zhang Chaojing Tang

This paper proposes a novel type of RFID application, i.e., RFID seeking. Several existing types of RFID applications such as monitoring, searching, locating/navigating, are similar with RFID seeking. However, they are either inapplicable or vulnerable for RFID seeking scenarios, in which a user is to find a lost tagged item in a blind spot, or to find a wanted item among a mass of similar ones...

Journal: :The Electronic Library 2007
Shien-Chiang Yu

Purpose – Radio frequency identification (RFID) applications that provide batch access, storage mass data and reprogramming are better than barcodes. Applying RFID can promote operational efficiency and precision. The cost is one of the major factors influencing whether or not RFID will be accepted in libraries. Although RFID has improved the efficiency of libraries, the essence of the library ...

2015
Kashish M. Makhijani K. G. Maradia Yi-Fang Lin Shu-An Yeh Hua-Ming Chen Sue- Wei Chang Klaus Finkenzeller Raj Mittra Jiyan Mao Sibo Li Qingxin Guo Hui Zhang Junhong Wang

Yi-Fang Lin; Shu-An Yeh; Hua-Ming Chen; SueWei Chang, "Design of an Omnidirectional Polarized RFID Tag Antenna for Safety Glass Applications," Antennas and Propagation, IEEE Transactions on , vol. 60, no. 10, pp. 4530,4537, Oct. 2012 Reich, M. T. ; Bauer-Reich, C. , "UHF RFID impedance matching: When is a T-match not a T-match?," RFID (IEEE RFID), 2014 IEEE International Con...

Journal: :Computer Communications 2008
Bo Sun Yang Xiao Chung-Chih Li Hsiao-Hwa Chen T. Andrew Yang

Recentadvances inwirelessnetworksandembedded systemshavecreatedanewclass ofpervasive systems such as Wireless Sensor Networks (WSNs) and Radio Frequency IDentification (RFID) systems. WSNs and RFID systems provide promising solutions for a wide variety of applications, particularly in pervasive computing.However, security andprivacy concernshave raised serious challenges on these systems. These...

2005
Wei Wang Duncan McFarlane James Brusey

Radio Frequency Identification (RFID) is an automatic identification (Auto-ID) technology which allows remote interrogation of ID data on RFID tags using radio frequency (RF) as a means of wireless communication between tagged objects and RFID readers. This paper studies whether so called ”networked RFID” systems can meet the timing constraints set by real-time industrial control applications. ...

2014
Cristina Turcu Saber H. Zainud-Deen Hend A. Malhat Kamal H. Awadalla

The design of a NF‐ focused DRA phased array antenna is implemented for fixed RFID reader applications at 5.8 GHz. The radiated field is focused in the near‐zone of the array aperture. Numerical investigations on the radiation characteristics of the NF‐ focused array as well as uniform phase array are presented to demonstrate its feasibility for RFID real appl...

2014
Raghuvir Songhela Manik Lal Das

Radio Frequency IDentification (RFID) systems are gaining enormous interests in industry due to their vast applications such as supply chain, access control, inventory, transport, health care and home appliances. Although tag identification is the primary security goal of an RFID system, privacy issue is equally, even more important concern in the RFID system because of pervasiveness of RFID ta...

2007
Evan Welbourne Nodira Khoussainova Travis Kriplean Magdalena Balazinska Gaetano Borriello Dan Suciu

In this paper, we design a rule-based privacy policy for the RFID Ecosystem, an RFID-based ubiquitous computing system. We start from the physical access control (PAC) rule (Kriplean et al., IEEE Pervasive Computing 2007) that provides a default level of privacy but constrains the possible set of applications. We extend it by using principled ways of defining other access control rules that ret...

2011
M Wortley

SmartTag is a radio frequency identifi cation (RFID) based technology designed to allow tracking of ore from its source through blasting, run-of-mine (ROM) pads, crushers, intermediate stockpiles and fi nally into the concentrator. This paper presents current developments and the future direction of the SmartTagTM ore tracking system, as well as presenting some case studies. Successful applicat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید