Academic literature on the topic 'RFID implementation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RFID implementation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "RFID implementation"

1

Kapoor, Kawal, Yogesh K. Dwivedi, Michael D. Williams, Mohini Singh, and Mark J. Hughes. "What Drives a Successful Technology Implementation?" International Journal of Electronic Government Research 7, no. 4 (October 2011): 46–63. http://dx.doi.org/10.4018/jegr.2011100104.

Full text
Abstract:
Radio Frequency Identification (RFID) is revolutionizing item identification and tracking. The technology demonstrates complexities in terms of (a) huge initial capital investment, (b) validating the need for RFID followed by its implementation decisions, (c) risks associated with consumer acceptance and consequences of incorrect implementation, and (d) capability to support enhancements and upgrades in cordial agreement with the individual implementer organizations. This paper explores the extent of RFID implementation at the Swansea University Library, examining the Social, Technological, Economic, and Managerial (STEM) aspects directly associated with implementation. A focused interview approach was resorted to, for data collection purposes. The core implementation team for RFID at Swansea University was interviewed to gain insights into the study’s areas of interest. It was found that self service is the most sought after benefit. It simplifies stock management and enhances security at the libraries. Although the cost of the system remains a concern, varying on the basis of the scale of implementation, vandalism also continues to exist but to a reduced degree. University libraries are public sector organizations, consequently leading these findings to have an insinuation for RFID implementations in other public sector organizations as well.
APA, Harvard, Vancouver, ISO, and other styles
2

BARUT, MEHMET, ROBERT BROWN, NICOLE FREUND, JONATHAN MAY, and ELIZABETH REINHART. "RFID and Corporate Responsibility: Hidden Costs in RFID Implementation." Business and Society Review 111, no. 3 (September 2006): 287–303. http://dx.doi.org/10.1111/j.1467-8594.2006.00273.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yuan, Jin Sha, and Yue Hu. "Implementation of RFID Middleware Based on Hash Chain." Applied Mechanics and Materials 411-414 (September 2013): 12–15. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.12.

Full text
Abstract:
With the development of RFID technology , RFID middleware is gradually being taken seriously.RFID middleware can provide strong support for the RFID system, to make it more widely available. This paper introduces the MD5 and SHA-two kinds of hash algorithm.The design of RFID middleware software implementation based on the Hash link protocol, laid the foundation for the programming and Realization of software.
APA, Harvard, Vancouver, ISO, and other styles
4

Tran, Phuoc-Nguyen, and Nadia Boukhatem. "Design and Implementation of IP-based RFID Location Systems." Journal of Communications Software and Systems 5, no. 2 (June 22, 2009): 67. http://dx.doi.org/10.24138/jcomss.v5i2.207.

Full text
Abstract:
Designing an IP-based RFID system allows low costdeployment and easy integration with IP-based services. In this paper, we propose an IP-based RFID architecture and focus on location management which allows determining “where” the object is after moving. The IP-based RFID architecture includes several components that allow collecting information from RFID infrastructure and updating the current location of RFID tags. A SIP-based implementation is proposed to validate the proposed architecture.
APA, Harvard, Vancouver, ISO, and other styles
5

Unnithan, Chandana. "RFID Implementation in Australian Hospitals." International Journal of Enterprise Information Systems 10, no. 2 (April 2014): 40–61. http://dx.doi.org/10.4018/ijeis.2014040103.

Full text
Abstract:
Radio Frequency Identification (RFID) is a mobile technology that was explored in hospitals in the last decade for improving process efficiencies. However, in the Australian context, this technology is still regarded as an innovation that health ICT practitioners and hospitals are reluctant to trial. This technology, although non-intrusive, is perceived as disruptive by hospitals. Information Systems professionals in the ICT sector and Health Informatics practitioners in Australia are exploring best practices for implementation. In this research paper, I report on findings from empirical research that was conducted in Australia, based in two large hospitals1, to better understand the factors involved in the successful implementation of RFID in Australian hospitals. Findings from this study are presented and endorsed by health ICT practitioners and informatics professionals as current implications for the field.
APA, Harvard, Vancouver, ISO, and other styles
6

Lorchirachoonkul, William, and John P. T. Mo. "RFID implementation with virtual infrastructures." Business Process Management Journal 16, no. 6 (November 9, 2010): 917–31. http://dx.doi.org/10.1108/14637151011092991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Spekman, Robert E., and Patrick J. Sweeney. "RFID: from concept to implementation." International Journal of Physical Distribution & Logistics Management 36, no. 10 (December 2006): 736–54. http://dx.doi.org/10.1108/09600030610714571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Li Yan, Ling Ling Sun, Zhi Hua Xiao, and Fei Yue Hu. "UHF RFID Reader Implementation for EPC C1G2 Protocol." Advanced Materials Research 219-220 (March 2011): 1608–11. http://dx.doi.org/10.4028/www.scientific.net/amr.219-220.1608.

Full text
Abstract:
UHF RFID system has been mainly used in logistics,production and supply chain management. The implementation of UHF RFID reader with excellent performance is still challenging. This paper presents a UHF RFID reader implementation for EPC C1G2 protocol. EPC C1G2 physical layer architecture and some critical modules like encoder ,decoder, modulator and demodulator are described in details. All modules are verified in FPGA and the experiments demonstrate that the designed RFID reader baseband system could perform well.
APA, Harvard, Vancouver, ISO, and other styles
9

Fujisaki, Kiyotaka. "Implementation of a RFID-based System for Library Management." International Journal of Distributed Systems and Technologies 6, no. 3 (July 2015): 1–10. http://dx.doi.org/10.4018/ijdst.2015070101.

Full text
Abstract:
Using electromagnetic coupling, an RFID tag can get power supplier by a reader and communicate with it for data exchange. Because the RFID system enables non-contact communication, various services and applications including the management of a library catalogue are possible. However, the system is affected easily by neighboring environment and the resonant frequency, thus the communication performance is degraded. In this paper, is used 13.56MHz RFID system for the management of the library. We evaluate the influence that papers or other RFID tags give to the resonant frequency of an RFID tag.
APA, Harvard, Vancouver, ISO, and other styles
10

Balakrishna, J. "Design and Implementation of RFID Controller using Verilog HDL." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 4335–42. http://dx.doi.org/10.22214/ijraset.2021.35942.

Full text
Abstract:
Manual monitoring consumes more time, man power and shows inaccurate results. So, automation is the solution to cover the problems stated. Barcode and RFID are two different forms of automated technology that are used for reading and collecting data. The RFID (Radio Frequency Identification) technology is a well-known wireless application for traceability, logistics and access control. The RFID controller is constructed in to demonstrate access control through the use of low-frequency RFID tags. These tags contain identification number which is read by the reader, sent to a database where it is compared with stored values. It works on the principle that If the tag’s identification number is in the system database, it gives access. If the data is not in the system database, it doesn’t give access. To implement these various blocks, include RFID transmitter, RFID receiver, Baud clock generator, Database are designed. The RFID Controller is designed using Verilog HDL in Xilinx ISE tool.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "RFID implementation"

1

Hussain, Assad, and Hafeez Muhammad Kazim. "Implementation Study of IEEE 802 : 15.4." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-285.

Full text
Abstract:

This thesis is analysis-based survey in which our task was to find out the suitability of

IEEE 802.15.4 for the RFID systems in terms of power. We studied the different RFID

systems. We analyzed the IEEE 802.15.4 to see how much this protocol can facilitate the

RFID application, but we just considered the 2.4 GHz physical band as Free2move uses

this band for its RFID products. Since semi-passive1 RFIDs are the closest competitors

of the active RFID, so we also compared the IEEE 802.15.4 with ISO 18000-4 (mode2)

to find out their pros and cons.

We also tried to evaluate the hardware architecture proposed by Free2move. We

compared proposed hardware components with other competitors available in the market.

The main point of focus during hardware evaluation remained its power efficiency. As

concluding part we have proposed an idea for using the IEEE 802.15.4 standard in semi-

passive RFIDs.

APA, Harvard, Vancouver, ISO, and other styles
2

Borisenko, Alexey. "Design and Implementation of an Augmented RFID System." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22914.

Full text
Abstract:
Ultra high frequency (UHF) radio frequency identification (RFID) systems suffer from issues that limit their widespread deployment and limit the number of applications where they can be used. These limitations are: lack of a well defined read zone, interference, and environment sensitivity. To overcome these limitations a novel receiver device is introduced into the system. The use of such device or devices mitigates the issues by enabling more "anchor points" in the system. Two such devices exist in industry and academia: the Astraion Sensatag and the Gen2 Listener. The drawbacks of the Sensatag is that it offers poor performance in capturing tag signals. The Gen2 Listener is based on the expensive software defined radio hardware. The purpose of the thesis was to develop a receiver that will enable several new RFID applications that are not available with current RFID systems. The receiver, named ARR (Augmented RFID Receiver), receives tag and reader signals, which are decoded by an FPGA and the results are reported through Ethernet. This device is central to the augmented RFID system. To show the suitability of such an approach, the performance of the implementation was compared to the other two outlined solutions. A comparison of the read rate and range of the implementations were the defining factors. The analysis showed that the ARR is capable of receiving tag signals with a read rate of 50% for passive and 66% for semi-passive tags at a one meter distance and is capable of receiving tag signals at a maximum of 3.25 meters for passive and 5.5 meters for semi- passive tags, with the reader being within 8 meters of the ARR. Two applications were implemented to showcase the ARR: an RFID portal and protocol analyzer.
APA, Harvard, Vancouver, ISO, and other styles
3

Zeng, Yuyu. "Design, adoption and implementation issues in RFID applications." Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B37013488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zeng, Yuyu, and 曾玉玉. "Design, adoption and implementation issues in RFID applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B37013488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dabo, Al-amin Abba. "Organisational factors in RFID adoption, implementation, and benefits." Thesis, University of Central Lancashire, 2017. http://clok.uclan.ac.uk/20740/.

Full text
Abstract:
This study investigates the impact of organisational and technological factors within pre-adoption, implementation, and post-implementation phases of RFID system deployment. In the pre-adoption phase, the study examines factors that drive and hinder organisations’ decision to adopt RFID. In the implementation phase, the study investigates the impact of organisational factors (business size, strength of culture, and business process re-engineering) on influencing the implementation processes of RFID. In the post-implementation phase, the study investigates how the benefits derived from RFID implementation interact with organisational factors (business size, strength of culture, and business process re-engineering) and RFID-related factors (product unit level of tagging, RFID implementation stage, and organisational pedigree in RFID). This study was motivated by the lack of (i) an advisory framework which considers quantifiable firm characteristics and the costs and benefits of implementing RFID, in yielding advice to guide decisions on RFID adoption, and (ii) a framework that covers the complete processes of RFID project deployment (from adoption decision to benefits derived) in yielding advice to guide decisions on RFID adoption. This study is achieved using a two-phase research approach: questionnaire survey of organisations that have adopted or plan to adopt RFID and case studies of organisations that have integrated RFID into their business processes. In addition, a thorough review of existing literature on RFID in different industrial settings was conducted. The key findings from the study indicate that RFID adoption is driven by factors from technological, organisational and environmental contexts and that the adoption, implementation and benefits of RFID are influenced by organisational culture strength, business size, and BPR. It was found that strong cultures, organisational size and BPR are all positively correlated with RFID adoption decisions, implementation and benefits. Potential contribution towards the existing body of knowledge is through highlighting the significance of organisational culture strength, business size, and BPR in providing a platform in which RFID will be accepted and implemented successfully to achieve maximum derivable benefits.
APA, Harvard, Vancouver, ISO, and other styles
6

Dighe, Ashish Arun. "Implementation of RSA Cryptosystem for Next Generation RFID Tags." Thèse, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/19856.

Full text
Abstract:
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology. By estimating the area, power and time constraints of the RFID platform, it was determined that the area constraint was the critical variable in determining the maximum implementable security variable. Although the application of this algorithm has been targeted for passive HF RFID platforms, the algorithm could be used in other low power, sized constrained applications.
APA, Harvard, Vancouver, ISO, and other styles
7

Muller, Francois Dominicus. "FPGA implementation of an enhanced digital detection algorithm for medium range RFID readers / Francois Dominicus Muller." Thesis, North-West University, 2008. http://hdl.handle.net/10394/2643.

Full text
Abstract:
The School of Electrical, Electronic and Computer Engineering of the North-West University is conducting research about RFID (radio frequency identification) medium range reader systems for an international company, iPico. The focus area of the present research is the development of a robust tag detection algorithm for noisy environments. During the past three years a digital detection algorithm was developed. This digital detection algorithm delivered significant improvements in detection of RFIDs over its analogue counterpart, especially in noisy environments. However, the digital detection algorithm was found to be very sensitive with regard to data rate deviations. Although the latter algorithm improved the detection of RFIDs, ghost (absent) tags were now also detected. The objectives of this project are, to develop an enhanced detection algorithm which is less sensitive to frequency deviations and to eliminate the appearance of the so called ghost tags. The proposed enhanced algorithm will be implemented on a FPGA (field programmable gate array), more specific the Altera Cyclone EP1CT144C6 FPGA.
Thesis (M.Ing. (Computer and Electronical Engineering))--North-West University, Potchefstroom Campus, 2009.
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Bo, and 楊波. "Implementation issues in RFID-based track-and-trace anti-counterfeiting." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/208016.

Full text
Abstract:
Counterfeit products, particularly pharmaceuticals, electronic devices, and apparels, are widespread. They threaten consumer safety and cause huge economic losses to licit supply chain partners and governments. Although a number of traditional anti-counterfeiting technologies, such as holograms and chemical tags, are available to combat counterfeiting, they are vulnerable to imitation or being reused. Besides, these technologies are intended to protect individual items, rather than to safeguard an entire supply chain. As such, fake products may likely be injected into the supply chain to hurt end-consumers. Track-and-trace technology based on Radio Frequency Identification (RFID) has recently emerged as a promising tool to combat counterfeiting, because of its automatic and non-line-of-sight capability to identify massive product items. By maintaining an electronic pedigree (e-pedigree) that records the transaction information of product items along the supply chain, this approach stands out for protecting the supply chain against infiltration, eliminating theft and fraud, facilitating recall of defective products, and supporting remote authentication. However, a number of technical and critical issues have yet to be solved for practical implementation of RFID-based track-and-trace anti-counterfeiting. These include generation of accurate initial product e-pedigree in fast moving manufacturing lines, precise e-pedigree updating in batch product distributing and receiving, and fast e- pedigree queries for remote and real-time product authentication from end-customers. Without fully addressing these issues, the accumulated product e-pedigree data would be untrustworthy, rendering any subsequent operations of track-and-trace and product authentication unreliable. This thesis investigates the crucial implementation issues in RFID-based track-and-trace anti-counterfeiting. It firstly presents an innovative track-and-trace anti-counterfeiting system, based on which a TDPS algorithm is proposed for generation of initial product e-pedigree in fast moving production lines. The TDPS overcomes many practical issues, such as tag writing error and tag locking failure, and helps identify the bottleneck of initial product e-pedigree generation. To tackle the bottleneck, the TDPS is further optimized by incorporating a block writing method to enhance the tag EPC writing efficiency and an integration method to balance the overhead of RFID equipment. In product distributing and receiving, a mechanized 3D scanning method is proposed to improve bulk item identification rate and enhance the accuracy and completeness of product e-pedigree. Indeed, RFID-based track-and-trace anti-counterfeiting mandates a relatively high bulk item identification rate for product authentication and e-pedigree updating. Experimental results demonstrate that the mechanized 3D scanning can achieve a bulk item reading rate of up to 98.9%, which largely outperforms the widely documented bulk reading rate (70%) in real applications. In retailing level, the efficiency of e-pedigree queries would hugely impact on customer shopping experience and the effectiveness of track-and-trace anti-counterfeiting. A partition-based method is therefore developed to cluster product e-pedigree data to improve the speed of e-pedigree queries. This approach partitions the accumulated e-pedigree data into fixed and dynamic groups, such that queries are conducted mainly on active data, rather than on the whole historical data sets. By addressing the above key issues, this thesis contributes to making implementation of RFID-based track-and-trace anti-counterfeiting practically viable and reliable.
published_or_final_version
Industrial and Manufacturing Systems Engineering
Master
Master of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
9

Agrawal, Ambuj. "Implementation of Application Layer Protocol for an Active RFID System." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/34961.

Full text
Abstract:
The emerging technology of active RFID tags has strong potential in the areas of real time health monitoring, sorting of cargo, and large scale inventory management because of their longer communication range and larger data storage capacity. The market of active RFID is growing very rapidly and therefore there has been an increase in the number of companies engaging in this field. But very often it is found that the products available in the market are not always suited to the application at hand. To overcome this problem, off the shelf active RFID products which were reconfigurable and followed a standard PHY and MAC layer protocol were used for this work. By reprogramming the application layer protocol of the RFID hardware, these devices were made suitable for the desired application. This also allowed the RFID tags to extend their functionality by interfacing extra modules with themselves. The work presented in this thesis describes the way in which the microcontroller on board the active RFID tags and readers can be programmed so that the functionality of the RFID hardware can be changed as per requirements. It also shows that extra modules can be added to the tag by successfully interfacing an accelerometer module with the tag.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
10

Andréasson, David. "En annan upplaga av oss : Cyborgens implementation i samhället." Thesis, Blekinge Tekniska Högskola, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-994.

Full text
Abstract:
Cyborgen, en samansättning av orden cybernetik och organism, en gestalt vars innebörd bör ses som mer än en fiktiv gestaltning. Cyborgen är idag enligt forskare och filosofer en samhällelig verklighet och dess inverkan på individen är mycket större än vi tror. Det här kandidatarbetet undersöker vad som definierar en cyborg, med stöd ifrån forskning och filosofin summeras tankar och synsätt för att få en mer definitiv bild av begreppet. Arbetet studerar även hur den sociala kontexten kan komma att förvrängas när tekniken letar sig in i den köttsliga kroppen. De resultat och insikter arbetet resulterat i sammanfattas och står som grund för en gestaltning vars mål har varit att kategorisera öppen data från individer med inbyggda Rfid-chip, en diskussion av begreppet och dess innebörd sammanfattas i en resultatdel för att få en bred bild av cyborgen som helhet. Metoder såsom workshop och litteraturstudier har bidragit till att arbetet fått en bredare bild av människans sätt att leva tillsammans med tekniken.
Cyborg, a shared setting of the words cybernetics and organism, a figure whose meaning should be seen as more than a fictional creation. The cyborg is today, according to scientists and philosophers a social reality and its impact on the individual is much greater than we can imagine. This bachelor thesis investigates what defines a cyborg, with support from research and philosophy thoughts and approach are summed up to get a more definitive picture of the concept. The work also studies how the social context may be distorted when the technology finds its way into the physical body. The results and insights this work resulted in is summarized and stands as the basis for a design whose goal has been to categorize open data from individuals with built-in RFID chip, a discussion of the concept and its meaning is summarized in the results section to get a broad picture of the whole cyborg. Methods such as workshops and literature studies have helped to get a broader picture of the human way of living together with technology.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "RFID implementation"

1

Poirier, Charles C. RFID strategic implementation and ROI: A practical roadmap to success. Ft. Lauderdale, FL: J. Ross Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Myerson, Judith M., and Judith M. Myerson. RFID in the supply chain: A guide to selection and implementation. Boca Raton, FL: Auerbach, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

ADMINISTRATION, FEDERAL AVIATION. Radio frequency interference (RFI) project implementation plan. [Washington, D.C.?]: Dept. of Transportation, Federal Aviation Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

RFID Implementation. McGraw-Hill Osborne Media, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brown, Dennis. RFID Implementation. McGraw-Hill Osborne Media, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Development and Implementation of RFID Technology. InTech, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Turcu, Cristina, ed. Development and Implementation of RFID Technology. I-Tech Education and Publishing, 2009. http://dx.doi.org/10.5772/100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Poirier, Charles, and Duncan Mccollum. RFID Strategic Implementation and ROI: A Practical Roadmap to Success. J. Ross Publishing, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

RFID in the Supply Chain: A Guide to Selection and Implementation. Auerbach Publications, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Myerson, Judith M. RFID in the Supply Chain: A Guide to Selection and Implementation (Resource Management). AUERBACH, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "RFID implementation"

1

Feldhofer, Martin, and Johannes Wolkerstorfer. "Hardware Implementation of Symmetric Algorithms for RFID Security." In RFID Security, 373–415. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-76481-8_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Israsena, P., and S. Wongnamkum. "Hardware Implementation of a TEA-Based Lightweight Encryption for RFID Security." In RFID Security, 417–33. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-76481-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Choi, Young B., Tae Hwan Oh, and Rajath Chouta. "RFID Implementation and Security Issues." In Communications in Computer and Information Science, 236–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23141-4_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cevikcan, Emre, and Alp Ustundag. "Decision Making for Determining the Implementation Level of RFID Projects." In The Value of RFID, 53–67. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4345-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cheong, Taesu, and Youngil Kim. "RFID Data Management and RFID Information Value Chain Support with RFID Middleware Platform Implementation." In Lecture Notes in Computer Science, 557–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11575771_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Szekely, Alexander, Michael Höfler, Robert Stögbuchner, and Manfred Aigner. "Security Enhanced WISPs: Implementation Challenges." In Wirelessly Powered Sensor Networks and Computational RFID, 189–204. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4419-6166-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Park, Chong Ryol, Sang Won Yoon, Kyung Kwon Jung, and Ki Hwan Eom. "Implementation of RFID Tag for Metal Surface Mount." In Communications in Computer and Information Science, 299–306. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16444-6_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barenghi, Alessandro, Cédric Hocquet, David Bol, François-Xavier Standaert, Francesco Regazzoni, and Israel Koren. "Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation." In RFID. Security and Privacy, 48–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25286-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Yang, and Peidong Zhuang. "RFID Based Electronic Toll Collection System Design and Implementation." In Machine Learning and Intelligent Communications, 635–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73564-1_64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Jae-Wook. "Implementation of Smart Classroom Information Display System Using RFID." In Communications in Computer and Information Science, 314–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35264-5_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "RFID implementation"

1

Seshabhattar, Sai, Shesh Kumar Jagannatha, and Daniel W. Engels. "Security implementation within GEN2 protocol." In 2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA). IEEE, 2011. http://dx.doi.org/10.1109/rfid-ta.2011.6068669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Musab Umair Malik, Farooq Malik, Fahad Ahmed Khan, Nadeem Ehsan, and Ebtisam Mirza. "RFID implementation and security concerns." In 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccsit.2010.5564675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mayordomo, Iker, and Josef Bernhard. "Implementation of an adaptive leakage cancellation control for passive UHF RFID readers." In 2011 IEEE International Conference on RFID (IEEE RFID 2011). IEEE, 2011. http://dx.doi.org/10.1109/rfid.2011.5764611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hu, Jianguo, Deming Wang, Yanyu Ding, Jun Zhang, and Hongzhou Tan. "Design and implementation of intelligent RFID security authentication system." In 2010 IEEE International Conference on Rfid-Technology and Applications (RFID-TA). IEEE, 2010. http://dx.doi.org/10.1109/rfid-ta.2010.5529923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aleksandravicius, Jurgis, Nicolo Decarli, Anna Guerra, and Davide Dardari. "High-accuracy localization of backscattering uwb tags: Implementation and experimental results." In 2017 IEEE International Conference on RFID Technology & Application (RFID-TA). IEEE, 2017. http://dx.doi.org/10.1109/rfid-ta.2017.8098866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Narayanaswamy, Gaur, Shesh Kumar Jagannatha, and Daniel W. Engels. "Blocking Reader: Design and implementation of a low-cost passive UHF RFID Blocking Reader." In 2010 IEEE International Conference on RFID (IEEE RFID 2010). IEEE, 2010. http://dx.doi.org/10.1109/rfid.2010.5467236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zarabzadeh, Atieh, Farzad Hayati, R. William G. Watson, Geoff Bradley, and Jane Grimson. "Implementation of an RFID-based biological sample identification and tracking system." In 2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA). IEEE, 2011. http://dx.doi.org/10.1109/rfid-ta.2011.6068644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Grey, Salvador, Gerd vom Bogel, and Anton Grabmaier. "Flexible Development and Testing Environment for Implementation of New Algorithms in RFID Systems." In 2012 4th International EURASIP Workshop on RFID Technology (EURASIP RFID). IEEE, 2012. http://dx.doi.org/10.1109/rfid.2012.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baskir, S. G., and B. Ors. "Implementation of a secure RFID protocol." In 2013 21st Signal Processing and Communications Applications Conference (SIU). IEEE, 2013. http://dx.doi.org/10.1109/siu.2013.6531442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Amir, Zaid, Firas Abdullah Al-Saidi, and Hussein Abdulkadir. "Design and implementation of RFID system." In 2008 5th International Multi-Conference on Systems, Signals and Devices (SSD). IEEE, 2008. http://dx.doi.org/10.1109/ssd.2008.4632787.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "RFID implementation"

1

Fisch, John N., and David M. Koch. Towards an Effective Management Strategy for Passive RFID Implementation. Fort Belvoir, VA: Defense Technical Information Center, August 2004. http://dx.doi.org/10.21236/ada431489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Youngblut, Christine, Sarah H. Nash, and Michael S. Nash. Selected Issues in DoD's Radio Frequency Identification (RFID) Implementation. Fort Belvoir, VA: Defense Technical Information Center, April 2006. http://dx.doi.org/10.21236/ada465862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tiu, Joel D., and Shawn S. Bahk. A Cost Benefit Analysis of Radio Frequency Identification (RFID) Implementation at the Naval Postgraduate School's Dudley Knox Library. Fort Belvoir, VA: Defense Technical Information Center, December 2006. http://dx.doi.org/10.21236/ada460461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Harris, Jeffrey S., and Jeffrey S. Worrell. Pallet Management System: A Study of the Implementation of UID/RFID Technology for Tracking Shipping Materials Within the Department of Defense Distribution Network. Fort Belvoir, VA: Defense Technical Information Center, June 2008. http://dx.doi.org/10.21236/ada490613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Technology News 543 - reverse implementation of radio frequency identification (RFID) technology for personnel tracking in underground mines. U.S. Department of Health and Human Services, Public Health Service, Centers for Disease Control and Prevention, National Institute for Occupational Safety and Health, September 2011. http://dx.doi.org/10.26616/nioshpub2011209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography