نتایج جستجو برای: سیستم rfid
تعداد نتایج: 83077 فیلتر نتایج به سال:
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems — including RFID exploits, RFID worms, and RFID viruses. We present RFID malware design principles together with concrete examples; the highlight is a fully illustrated example of a self-replicating RFID virus. The various RFID malware approaches are then analyzed for their effectiveness across a range ...
Deployment of radio frequency identification (RFID) systems is rapidly growing and has the potential to affect many different industries and applications. We present a brief history of RFID technology and automatic identification systems. We summarize major RFID applications, and present a primer on RFID fundamental principles. Finally, we discuss several challenges and obstacles to RFID adopti...
RFID-technologies have been described as major enabling technologies for automated, contactless data collection. We conveyed a quantitative survey of 463 executives across various industries in Germany to investigate about the perceived strategic importance of RFID among IT decision makers, current RFID usage, companies' intentions to invest in RFID and visions of RFID application. The survey r...
Supply chain management has two streams of strategies, namely lean and agile. However, current RFID applications tend to overlook supply chain strategies and are designed for obvious RFID applications, like simply replacing barcodes. However, the full potential of RFID might not be achieved when RFID applications are not aligned with the supply chain strategies. Therefore, this study analyzes t...
شناسایی از طریق امواج رادیویی یا به اختصار rfid یک فناوری شناسایی خودکار است که برای تبادل اطلاعات در سیستم تولید، توزیع و فروش کالاها در دنیای امروز مورد استفاده قرار می گیرد. در این فناوری، هر کالا مجهز به یک برچسب با توانایی ارسال اطلاعات کالا به صورت رادیویی است که توسط داده خوان قرائت می شود. مجموعه برچسب ها و داده خوان ها یک شبکه rfid را شکل می دهند که در آن هر چند برچسب به یک داده خوان م...
Recently, mobile RFID (Radio Frequency Identification) services such as in smart poster or supply chain are rapidly growing up as a newly generating industry. Here, mobile RFID service is defined as a special type of mobile service using RFID tag packaging object and RFID reader attached mobile RFID terminal. This paper is to provide an approach for ensuring RFID net-work security based on secu...
This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platfor...
چکیده ندارد.
As the load of traffic increases in RFID middleware, RFID system can no longer manage the RFID tags. Because of the incapability of the RFID system to handle vast amount of RFID tags, there are possibilities that the data cannot be processed efficiently in the RFID middleware. Implementation of agent technology is useful for verification and validation in RFID system architecture because intell...
Radio Frequency identification (RFID) is the popular wireless induction system [1-7]. The same as the general bar code identification, each RFID tag in an RFID system is assumed that equips a unique ID (UID) itself. A standard RFID system is consisted of Tag, Reader, and Application. When an independent RFID tag approaches the RFID antenna, the induc‐ tion between RFID tag and antenna happens. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید