نتایج جستجو برای: سیستمهای rfid

تعداد نتایج: 12715  

2007
Uta Franziska Knebel Jan Marco Leimeister Helmut Krcmar

RFID-technologies have been described as major enabling technologies for automated, contactless data collection. We conveyed a quantitative survey of 463 executives across various industries in Germany to investigate about the perceived strategic importance of RFID among IT decision makers, current RFID usage, companies' intentions to invest in RFID and visions of RFID application. The survey r...

2009
Jerrel Leung Sung-Chi Chu Waiman Cheung

Supply chain management has two streams of strategies, namely lean and agile. However, current RFID applications tend to overlook supply chain strategies and are designed for obvious RFID applications, like simply replacing barcodes. However, the full potential of RFID might not be achieved when RFID applications are not aligned with the supply chain strategies. Therefore, this study analyzes t...

2007
Namje Park Seungjoo Kim Dongho Won

Recently, mobile RFID (Radio Frequency Identification) services such as in smart poster or supply chain are rapidly growing up as a newly generating industry. Here, mobile RFID service is defined as a special type of mobile service using RFID tag packaging object and RFID reader attached mobile RFID terminal. This paper is to provide an approach for ensuring RFID net-work security based on secu...

2006
Melanie R. Rieback Georgi N. Gaydadjiev Bruno Crispo Rutger F.H. Hofman Andrew S. Tanenbaum

This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platfor...

پایان نامه :وزارت بهداشت، درمان و آموزش پزشکی - دانشگاه علوم پزشکی و خدمات بهداشتی درمانی تهران 1355

چکیده ندارد.

2016
Muhammad Tarmizi Lockman Ali Selamat

As the load of traffic increases in RFID middleware, RFID system can no longer manage the RFID tags. Because of the incapability of the RFID system to handle vast amount of RFID tags, there are possibilities that the data cannot be processed efficiently in the RFID middleware. Implementation of agent technology is useful for verification and validation in RFID system architecture because intell...

2013
Ming-Shen Jian Jain-Shing Wu

Radio Frequency identification (RFID) is the popular wireless induction system [1-7]. The same as the general bar code identification, each RFID tag in an RFID system is assumed that equips a unique ID (UID) itself. A standard RFID system is consisted of Tag, Reader, and Application. When an independent RFID tag approaches the RFID antenna, the induc‐ tion between RFID tag and antenna happens. ...

2006
Namje Park Seungjoo Kim Dongho Won Howon Kim

Mobile RFID (Radio Frequency Identification) is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable services to user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. However, there are an increasing number of concerns, and even some resistances, related to consumer tracking and...

2009
Zhong Ren Chiu Chiang Tan Dong Wang Qun Li

An increasing number of applications use RFID in their design, but there is a lack of understanding of how mobility affects RFID performance in these applications. Unlike static RFID experiments, mobile RFID studies require more expensive equipment that are unavailable to most researchers. In this paper, we conduct machine-aided experiments to study the effects of mobility on RFID. Our results ...

2007
Shinji Shimojo

There are many emerging technologies to achieve “ubiquitous networking,” which is a federated network technology that supports various enablers such as 3G and B3G mobile, RFID tags, sensors, and actuators. From a service perspective, a number of context or ambient aware services are envisaged for “ubiquitous networking.” This should be discussed with wide experience of theoretical studies and i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید