نتایج جستجو برای: rfid system
تعداد نتایج: 2236517 فیلتر نتایج به سال:
Radio Frequency Identification (RFID) has been applied in various high security and high integrity settings. As an important ubiquitous technique, RFID offers opportunities for real-time item tracking, object identification, and inventory management. However, due to the high distribution and vulnerability of its components, an RFID system is subject to various threats which could affect the sys...
In the RFID middleware the traffic load are increase and it is depend on the number of unmanaged RFID tag that cannot be handle by the RFID middleware. Because of that, there are possibilities that the data cannot be process efficient in RFID middleware. Implementation of agent technology is useful in the verification for RFID system architecture because intelligent agent has a role such as aut...
abstract while computerized maintenance management system (cmms) enables maintenance managers and supervisors to access information about equipment, manpower and maintenance policies, there is still a need to facilitate getting data/information into the backend database where it can be utilized by the organization as information to make decisions regarding the operation of the organization. sig...
RFID today is the popular wireless induction system. Each RFID tag in RFID system is given a unique ID (UID). The RFID tag with memory also records the on demand information. When an independent RFID tag approaches the RFID antenna, the induction between tag and antenna happens. The information and content recorded in the tag is transmitted to the RFID antenna and translated into the computatio...
The book provides a comprehensive coverage on most recent developments in chipless and conventional RFID. It covers a wide range of topics from component level design, analysis, and development, to system integration, middleware, anti-collision, and security protocols. The chipless RFID will bring revolutionary impacts on low-cost item tagging in this millennium. The RFID based sensors and RF s...
Mobile RFID is a new application that provides a valuable service to users with mobile communication. Current RFID authentication schemes are not viable to use in mobile RFID environment. Since unlike in regular RFID environments, whereas the communication channel between the server and the reader is assumed to be secure, the communication channel between the server and reader in the mobile RFI...
Design and Implementation Of Hardware And Software Systems For Object Tracking Using RFID Technology
-------------------------------------------------------------------ABSTRACT-------------------------------------------------------------Now a day’s mobile technology plays key role, in various environments identification of objects can be done manually, to improve the efficiency of an identification of objects we are using RFID tags. RFID tags track objects in supply chains, and are working the...
Under RFID sensor network environment, there are many situations to accommodate a number of RFID sensors within a specific area. In this paper, we build an analytical model of RFID sensor network and develop the analysis by using queuing system with ∞ / / 1 / / N M M . In order to study the application in RFID sensor network for the queue model, we give out long-run Time-average number of RFID ...
Radio Frequency Identification (RFID) System admits rapid identification of entities by itself in the discipline of pervasive computing. RFID system comprises readers and tags. Readers are communicating with the tag by broadcasting RF signals. In existing RFID system channel assignment, tag identification and collision is a vital issue. Henceforth efforts are requisite to minimize these issues....
RFID technology enables a new era of business optimization. With the development of RFID technology, more and more RFID applications have been developed. In RFID system, RFID middleware collects, filters, and integrates large volume of streaming data gathered continuously by heterogeneous readers to process queries from applications. These queries are called continuous queries as they are execu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید