نتایج جستجو برای: rfid applications
تعداد نتایج: 616818 فیلتر نتایج به سال:
RFID holds the promise of real-time identifying, locating, tracking and monitoring physical objects without line of sight, and can be used for a wide range of pervasive computing applications. To achieve these goals, RFID data have to be collected, transformed and expressively modeled as their virtual counterparts in the virtual world. RFID data, however, have their own unique characteristics –...
Radio frequency identification (RFID), The real-time location of objects and ability to track motion provide a wide range of useful applications in areas such as safety, security and supply chain. In recent years, radio frequency identification technology has moved from obscurity into mainstream applications that help speed the handling of manufactured goods and materials. RFID enables identifi...
according to the vital role of pharmaceutical industry in health care system, pharmaceutical supply chain security, standard production and distribution of the pharmaceutical products are of great importance for pharmaceutical companies. therefore, applying technology, especially radio frequency identification (rfid), is essential to achieve these goals. moreover, due to the importance of secur...
The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers. There has also been much talk of a very popular R...
Automatic object identification and distributed computing technology have recently been investigated in order to realize a ubiquitous computing environment. Radio-frequency identification (RFID) technology has been applied to many business areas such as logistics and supply chains. The Electronic Product Code (EPC) Network, an open global standard proposed by EPCglobal, links RFID to the Intern...
An increasing number of applications use RFID in their design, but there is a lack of understanding of how mobility affects RFID performance in these applications. Unlike static RFID experiments, mobile RFID studies require more expensive equipment that are unavailable to most researchers. In this paper, we conduct machine-aided experiments to study the effects of mobility on RFID. Our results ...
With the increasing popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection to users. Most recent RFID protocols use a central database to store the RFID tag data. An RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns the tag data to the reader. In this p...
This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed specifications of RFID transponders and RFID interrogators respectively. Secti...
We argue that sensing and computation platforms that leverage RFID technology can realize “smart-dust” applications that have eluded the sensor network community. RFID sensor networks (RSNs), which consist of RFID readers and RFID sensor nodes (WISPs), extend RFID to include sensing and bring the advantages of small, inexpensive and long-lived RFID tags to wireless sensor networks. We describe ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید