نتایج جستجو برای: smart rfid
تعداد نتایج: 82761 فیلتر نتایج به سال:
Many efforts are currently going towards networking smart things from the physical world (e.g. RFID, wireless sensor and actuator networks, embedded devices) on a larger scale. Rather than exposing real-world data and functionality through proprietary and tightly-coupled systems, several projects suggest to make them an integral part of the Web. As a result, smart things become easier to build ...
Regression Analysis for Gesture Recognition Using Passive RFID Technology in Smart Home Environments
Gesture recognition is a field of research that consists in recognizing patterns of movement performed by a human using his body parts with or without the help of a comprehensive device (a mouse, a laser, etc.). This particular area as attracted a number of researchers over the years that applied such algorithms in a broad range of disciplines. In particular, it was exploited on early research ...
Internet of things (IoT) makes it attainable for connecting different various smart objects together with the internet. The evolutionary medical model towards medicine can be boosted by IoT involving sensors such as environmental inside internal environment a small room specific purpose monitoring person's health kind assistance which remotely controlled. RF identification (RFID) technology is ...
A myriad of applications such as radio frequency identification (RFID) and smart card networks are emerging in which nodes are designed for extremely low-cost, large scale applications such that the replacement of batteries is not feasible. Energy conservation therefore becomes a major constraint. Classical access protocols are either not energy conserving or lead to unacceptable delays. In thi...
Protecting IPTV Service Network against Malicious Rendezvous Point p. 1 Design and Implementation of SIP-aware Security Management System p. 10 Device Security Application Management Framework in User Centric Smart Card Ownership Model p. 20 When Compromised Readers Meet RFID p. 36 HW Implementation Security Coding Schemes for Arithmetic and Logic Operations How Robust Are They? p. 51 Mechanism...
The chapter addresses the problem by presenting an analytical model for a 3-dimensional single folded loop antenna with detection coverage in space. Based on the antenna theory, the inductance and impedance of the loop antenna is investigated. Design issues including antenna topology, read range, tag orientations, proximity of metal and other antennas are addressed to determine proper antenna f...
The emerging technology of Radio Frequency IDentification (RFID) has enabled a wide range of automated tracking and monitoring applications. However, the process of interrogating a set of RFID tags usually involves sharing a wireless communication medium by an RFID reader and many tags. Tag collisions result in a significant delay to the interrogation process, and such collisions are hard to ov...
This paper1 discusses the vision, the challenges, possible usage scenarios and technological building blocks of the “Internet of Things”. In particular, we consider RFID and other important technological developments such as IP stacks and web servers for smart everyday objects. The paper concludes with a discussion of social and governance issues that are likely to arise as the vision of the In...
Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight cryptographic algorithms. In this paper a survey is done on the selected light weight cryptographic algorithms. The light weight cryptographic algorithms are of two types, block ...
A myriad of applications such as radio frequency identification (RFID) and smart card networks are emerging in which nodes are designed for extremely low-cost, large scale applications such that the replacement of batteries is not feasible. Energy conservation therefore becomes a major constraint. Classical access protocols are either not energy conserving or lead to unacceptable delays. In a p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید