نتایج جستجو برای: rfid system

تعداد نتایج: 2236517  

2009
Xiaoyong Su Rajit Gadh

In an RFID-enabled enterprise manufacturing system, diverse RFID devices and varying RFID data formats exist as a result of dynamically changing business operations, varying needs at different physical asset touch points/conditions, etc. This presents a significant challenge in device deployment, device control, RFID data capturing, RFID data integration – that are essential stacks within enter...

2017
Ali Alwadi Jeff Kilby Amjad Gawanmeh

This paper discusses implementing a Location-Aware Library RFID service employing Radio Frequency Identification as a communication technology. Automating a library system with passive RFID tag infrastructure is proven to be feasible, and can be achieved with even distribution of RFID Antennas, well designed RFID network, an appropriate middleware, and a library application with an accurate err...

2014
Hyun-Seok Kim

Recently, Radio frequency identification (RFID) has been an important and ubiquitous infrastructure technology for smart work system. As RFID tags are affixed to all items, they may be used to support various useful services. Security mechanisms for RFID systems, such as authentication and encryption, are therefore of utmost importance. However, there are many risks involved, for example user p...

2007
Chye-Hwa Loo Khaled Elmahgoub Fan Yang Atef Elsherbeni Darko Kajfez Ahmed Kishk Tamer Elsherbeni Leena Ukkonen Lauri Sydänheimo Markku Kivikoski Sari Merilampi Pekka Ruuskanen

Passive UHF RFID tag consists of a microchip attached to an antenna. Proper impedance match between the antenna and the chip is crucial in RFID tag design. It directly influences RFID tag performance characteristics such as the read range. It is known that an RFID microchip is a nonlinear load whose complex impedance varies with the frequency and the input power. We investigate the effect of us...

2007
Siti Zaiton Mohd Hashim

Middleware is a layer of the software that connects and manages application components running on distributed hosts. Several types of middleware are reflective middleware, eventbased middleware, object-oriented middleware, and message-oriented middleware. Adaptive middleware is part of reflective middleware, that allows the system’s behavior to be altered at run time to better match the system’...

Journal: :The Journal of Korean Institute of Electromagnetic Engineering and Science 2007

2010
Md. Kafil Uddin Mahbubur Rahman Goo Kim BongHee Hong

Recently sensor technology has drawn greater attention in ubiquitous computing by deploying huge amount of sensor tags in supply chain, harbor logistics, healthcare management etc. Sensor tags are capable to provide the sensing information of the product and item with its identification at the same time. The dual data generated from a sensor tag is RFID data and Sensing data. RFID Readers are u...

Journal: :Computer Communications 2010
Basel Alomair Radha Poovendran

Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-of-sight path. One of the main challenges for the successful commercialization of the RFID technology is the efficient, yet private, identification of low-cost tags in the presence of adversaries attempting to illegally...

2004
Junichiro Saito Jaecheol Ryou Kouichi Sakurai

A Radio-Frequency-Identification (RFID) tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. It emits an ID in response to a query from a radio communication device called as a reader. For this reason, the RFID tag is used for management of goods and it is used as a substitute for a bar code. However, RFID system may infringe on a consumer's priv...

Journal: :JCP 2013
Ya-li Liu Xiaolin Qin Chao Wang Bo-Han Li

The security and privacy of the tag carrier has become the bottle neck of Radio Frequency Identification (RFID) system development further. In this paper, we propose a robust authentication protocol based on Elliptic Curve Cryptography (ECC), which meets the requirement of resource-limited RFID systems. Our protocol achieves mutual authentication and possesses lightweight feature by reducing th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید