نتایج جستجو برای: reader to tag collision
تعداد نتایج: 10630264 فیلتر نتایج به سال:
The problems of identifying a set of tagged objects simultaneously in an RFID network have hampered the adoption of RFID universally. When multiple tags transmit their IDs in a single period of time to a single reader over a shared wireless channel, the tag signals may collide. This collision will disturb the reader’s identification process. Hence, we proposed a modified version of Accelerated ...
Radio Frequency Identification (RFID) technology is one of the most promising technologies in the IoT (The Internet of Things) era. Many RFID systems have been used in supermarkets or warehouses. There are two challenges for RFID anti-collision algorithms. The first challenge is accurately estimating the number of tags; the other is improving the efficiency of RFID systems. This paper proposes ...
A recent development in Wireless Sensor Networks (WSNs) research is to equip sensor nodes with an RFID reader so that they can be used to track animate or in-animate RFID tagged objects. A key problem in such networks, however, is the energy efficiency of current RFID anti-collision protocols. Specifically, the energy cost incurred by a RFID reader to read and monitor n tags. This paper, theref...
Purpose – Radio frequency identification (RFID) is a technology for tracking objects that is expected to be widely adopted in very near future. A reader device sends probes to a set of RFID tags, which then respond to the request. A tag is recognized only when it is the only one to respond to the probe. Only reader has collision detection capability. The problem considered here is to minimize t...
In this paper, we approach the problem of identifying a set of objects in an RFID network. We propose a modified version of Slotted Aloha protocol to reduce the number of transmission collisions. All tags select a slot to transmit their ID by generating a random number. If there is a collision in a slot, the reader broadcasts the next identification request only to tags which collided in that s...
feminine voice and narratology in wuthering heights wuthering heights as a general "bronte" work has extraordinary dimensions to it which can make it focal to different ways of interpretation. among other differences the issue of narrative voice is essential in understanding the ultimate purpose of wuthering heights. emily bronte uses different narrators from various focal points speaking of m...
In Internet of things (IoT), radio frequency identification (RFID) plays an important role to help people rapidly obtain information of objects associated with tags. Passive tags are cheap and require no batteries to operate, so they are widely used in RFID applications. Readers, on the other hand, have to provide power to activate passive tags to get their data. However, collision occurs when ...
This innovative door lock system is designed to make it easier control security in certain homes or rooms. can also be used government offices and factories restrict someone from entering a room that just anyone not enter. In this system, the automatic uses an ID-12 type RFID reader, Tag/Transponder, Arduino UNO R3, 5v Buzzer, Drop Bolt Lock, Relay Module, LCD. The reader as receiver, tag/trans...
Since communications between tag and reader in RFID system are by radio, anyone can access the tag and obtain its any information. And a tag always replies with the same ID so that it is hard to distinguish between a real and a fake tag. Thus, there are many security problems in today’s RFID System. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Adversary ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید