To see the other types of publications on this topic, follow the link: RFID readers.

Journal articles on the topic 'RFID readers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'RFID readers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hema, C., Sankar Sharmila, and M. Sandhya. "Tag count based priority scheduling algorithm for mitigating the RFID collisions." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 18, no. 1 (2020): 434–42. https://doi.org/10.11591/ijeecs.v18.i1.pp434-442.

Full text
Abstract:
RFID (Radio Frequency IDentification) is a developing technology that employs electromagnetic signals to send the data among reader and tags to identify categorize and track the moveable items. The objective of this paper is to mitigate the reader collision problem by scheduling the readers in RFID system. Mobile readers in the RFID network send the same frequency signal to the air to read the data from the tags. While these two signals interfere each other and Tags are unable to backscatter signal to the reader. This causes a reader collision problem. The Reader collision problem reduces the
APA, Harvard, Vancouver, ISO, and other styles
2

Tamayo Segarra, Jose Ignacio, Bilal Al Jammal, and Hakima Chaouchi. "New IoT proximity service based heterogeneous RFID readers collision control." PSU Research Review 1, no. 2 (2017): 127–49. http://dx.doi.org/10.1108/prr-03-2017-0019.

Full text
Abstract:
Purpose Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on, monitoring services became one of the major interests, including sensing technologies, and then more actuation for remote control-type of IoT applications such as smart homes, smart cities and Industry 4.0. In this paper, the authors focus on the RFID technology impairment. They propose to take advantage of the mature IoT technologies that offer native service discovery such as blutooth or LTE D2D ProSe or Wifi Di
APA, Harvard, Vancouver, ISO, and other styles
3

C, Hema, Sharmila Sankar, and Sandhya M. "Tag count based priority scheduling algorithm for mitigating the RFID collisions." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 1 (2020): 434. http://dx.doi.org/10.11591/ijeecs.v18.i1.pp434-442.

Full text
Abstract:
<p><span>RFID (Radio Frequency IDentification) is a developing technology that employs electromagnetic signals to send the data among reader and tags to identify categorize and track the moveable items. The objective of this paper is to mitigate the reader collision problem by scheduling the readers in RFID system. Mobile readers in the RFID network send the same frequency signal to the air to read the data from the tags. While these two signals interfere each other and Tags are unable to backscatter signal to the reader. This causes a reader collision problem. The Reader collision
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Chao, Shi Jie Zhou, Jia Qing Luo, and Yan Pan Chen. "A Lattice Discrete Model for Intensive RFID Reader Deployment." Applied Mechanics and Materials 340 (July 2013): 502–6. http://dx.doi.org/10.4028/www.scientific.net/amm.340.502.

Full text
Abstract:
In an intensive RFID reader environment, multiple RFID reader are deployed together to cover a pointed area. In such intensive RFID reader application, it needs to determine how many readers are enough to cover the expect area and calculate the position of readers. However, the coverage of multiple readers is a NP problem. Therefore, it needs an approximate approach to optimize the coverage. In this paper, we proposed a lattice decentralized approach to model the coverage problem of intensive RFID reader deployment. In our novel model, both the deployment area and the reader reading region are
APA, Harvard, Vancouver, ISO, and other styles
5

Ait Lhadj Lamin, S., A. Raghib, and B. Abou El Majd. "Robust multi-objective optimization for solving the RFID network planning problem." Mathematical Modeling and Computing 8, no. 4 (2021): 616–26. http://dx.doi.org/10.23939/mmc2021.04.616.

Full text
Abstract:
Radio-frequency identification (RFID) is a new technology used for identifying and tracking objects or people by radio-frequency waves to facilitate automated traceability and data collection. The RFID system consists of an electronic tag attached to an object, readers, and a middleware. In the latest real applications based on the RFID technology, the deployment of readers has become a central issue for RFID network planning by means of optimizing several objectives such as the coverage of tags, the number of readers, and the readers/tags interferences. In practice, the system is affected by
APA, Harvard, Vancouver, ISO, and other styles
6

Sanam, Ezeddin, Kamaruzzaman Seman, M. S. Jawad, Abadal Salam T. Hussain, and Mohd Zalisham Jali. "Impulse-Based UWB for Next Generation Secure and Tunable Short-Range Wireless Infrastructures." Applied Mechanics and Materials 793 (September 2015): 535–40. http://dx.doi.org/10.4028/www.scientific.net/amm.793.535.

Full text
Abstract:
There will be increasing demand for high confidentiality, integrity, authentication, for widely deployment of the next RFID generation beside that, the focus will be on avoiding encryption algorithms; as these require more complex modulation, to secure communication between RFID’s tags and readers. In this paper, the focus will be on securing the communication channel between tags and readers at the physical layer, rather than to secure the contents of RFIDs data by encryption. The RFID reader initially will communicate with the tag through a narrowband communication and subsequently through b
APA, Harvard, Vancouver, ISO, and other styles
7

Habaebi, Mohamed Hadi, Rashid Khamis Omar, and Md Rafiqul Islam. "Mobile Drone Localization in Indoor Environment Based on Passive RFID." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 05 (2020): 4. http://dx.doi.org/10.3991/ijim.v14i05.13309.

Full text
Abstract:
<p class="AEEEAbstract">Radio Frequency Identification (RFID) is an information exchange technology based on RF communication. It provides solution to track and localize mobile objects in the indoor environment. Localization of mobile objects in an indoor environment garnered a significant attention due to the variety of applications needing higher degree of localization accuracy. RSS-based localization techniques are the major tools for tracking applications due to their simplicity. In this paper, a trilateration method for indoor localization is proposed. This method provides a solutio
APA, Harvard, Vancouver, ISO, and other styles
8

S, Vindhya, Tejaswini A, Monika Y, Dr Sharanraj V, and Dr Vasanth Kumar. "Development on Mechatronics Based RFID Attendance System with Artificial Intelligence." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem38027.

Full text
Abstract:
An RFID attendance system is a system that uses radio frequency identification (RFID) technology to track and record attendance. RFID tags are small electronic devices that store a unique identifier. When an RFID tag is brought near an RFID reader, the reader can read the identifier and send it to a computer. The computer can then use the identifier to look up the corresponding person's attendance record. An RFID attendance system is an automated system that uses RFID (Radio Frequency Identification) technology to track and record employee attendance. It consists of two main components: RFID t
APA, Harvard, Vancouver, ISO, and other styles
9

Ma, Qian, Xia Li, Guanyu Li, Bo Ning, Mei Bai, and Xite Wang. "MRLIHT: Mobile RFID-Based Localization for Indoor Human Tracking." Sensors 20, no. 6 (2020): 1711. http://dx.doi.org/10.3390/s20061711.

Full text
Abstract:
Radio Frequency Identification (RFID) technology has been widely used in indoor location tracking, especially serving human beings, due to its advantage of low cost, non-contact communication, resistance to hostile environments and so forth. Over the years, many indoor location tracking methods have been proposed. However, tracking mobile RFID readers in real-time has been a daunting task, especially for achieving high localization accuracy. In this paper, we propose a new Mobile RFID (M-RFID)-based Localization approach for Indoor Human Tracking, named MRLIHT. Based on the M-RFID model where
APA, Harvard, Vancouver, ISO, and other styles
10

Ouadou, Mourad, Rachid Mafamane, and Khalid Minaoui. "A Hybrid Anti-Collision Protocol Based on Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA) for Radio Frequency Identification (RFID) Readers." Network 4, no. 2 (2024): 217–36. http://dx.doi.org/10.3390/network4020011.

Full text
Abstract:
Radio Frequency Identification (RFID) technology plays a crucial role in various Internet of Things (IoT) applications, necessitating the integration of RFID systems into dense networks. However, the presence of numerous readers leads to collisions, degrading communication between readers and tags and compromising system performance. To tackle this challenge, researchers have proposed Medium Access Control (MAC) layer protocols employing different channel access methods. In this paper, we present a novel solution, the Distributed Time Slot Anti-Collision protocol (DTS-AC), which employs a new
APA, Harvard, Vancouver, ISO, and other styles
11

Huda, Huda, and Farah Q. Abdullah AL AL-Khalidi. "Evaluation Software and IT Integration for IoT-based Healthcare Radio Frequency Identification Network Planning." Fusion: Practice and Applications 15, no. 2 (2024): 288–97. http://dx.doi.org/10.54216/fpa.150224.

Full text
Abstract:
For Internet of Things (IoT)-based on healthcare systems to autonomously monitor patients, radio frequency identification, or RFID, its essential. It is difficult to guarantee complete coverage throughout sizable healthcare facilities with a small number of RFID readers, though Software for RFID network planning must be optimized. The purpose of this paper is about optimizing related software and suggest a topological RFID network planning strategy that will minimize reader interference while deploying the fewest possible readers. The best location for RFID tags on patients as well as readers
APA, Harvard, Vancouver, ISO, and other styles
12

Trebuna, Peter, Matus Matiscsak, Marek Kliment, and Miriam Pekarcikova. "The usage of RFID robots in logistics process management." Acta logistica 10, no. 1 (2023): 89–93. http://dx.doi.org/10.22306/al.v10i1.359.

Full text
Abstract:
The aim of this post is to point out the use of RFID robots in the management of logistics processes. RFID technology is defined first. RFID technology represents identification using radio frequency waves. The principle is to store the necessary data in radio frequency memory chips and then repeatedly read or write the data using a reader. We divide RFID chips into active and passive. Active RFID chips use energy from a battery, while passive RFID chips are a technology without an internal power source. Passive RFID is the most common form of RFID in warehouses, using which inventory is taken
APA, Harvard, Vancouver, ISO, and other styles
13

He, Zhiyong. "Reader Scheduling for Tag Population Estimation in Multicategory and Multireader RFID Systems." Wireless Communications and Mobile Computing 2021 (July 10, 2021): 1–9. http://dx.doi.org/10.1155/2021/7901590.

Full text
Abstract:
Radio Frequency Identification (RFID) technology has been used in numerous applications, e.g., supply chain management and inventory control. This paper focuses on the practically important problem of the rapid estimation of the number of tags in large-scale RFID systems with multiple readers and multicategory RFID tags. RFID readers are often static and have to be deployed strategically after careful planning to cover the entire monitoring area, but reader-to-reader collision (R2Rc) remains a problem. R2Rc decreases the reliability of the estimation of the tag population size, because it resu
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Shanjin, Zhonghua Li, Chunhui He, and Jianming Li. "An Effective Scheduling-Based RFID Reader Collision Avoidance Model and Its Resource Allocation via Artificial Immune Network." Mathematical Problems in Engineering 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/7854154.

Full text
Abstract:
Radio frequency identification, that is, RFID, is one of important technologies in Internet of Things. Reader collision does impair the tag identification efficiency of an RFID system. Many developed methods, for example, the scheduling-based series, that are used to avoid RFID reader collision, have been developed. For scheduling-based methods, communication resources, that is, time slots, channels, and power, are optimally assigned to readers. In this case, reader collision avoidance is equivalent to an optimization problem related to resource allocation. However, the existing methods neglec
APA, Harvard, Vancouver, ISO, and other styles
15

Kotresh, Prof Dr S. "Radio Frequency Identification of Attendance System." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 1870–73. http://dx.doi.org/10.22214/ijraset.2024.61950.

Full text
Abstract:
Abstract: An RFID (Radio Frequency Identification) based attendance system is a technology-driven approachthat automates the process of recording attendance. This abstract outlines the key components and functionality of such a system. RFID technology employs electromagnetic fields to automatically identify and track tags attached to objects or individuals. In the context of attendance tracking, RFIDtags are assigned to students, employees, or participants. These tags are embedded with unique identification information. The attendance system consists of several components including RFID tags,
APA, Harvard, Vancouver, ISO, and other styles
16

Cheng, Jun Jun, Cheng Cheng, Kui Fei Yu, Antti Ylä-Jääski, Zhong Li, and Hao Zhang. "Mechanism on RFID Tag Privacy Information Coordination Protection." Applied Mechanics and Materials 241-244 (December 2012): 3195–200. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.3195.

Full text
Abstract:
RFID system is facing the serious problems of private security, which mainly consists of the leakage of tag sensitive information, tracking and monitoring spitefully the carrier of mobile tag. This paper constructs a coordination protection mechanism of tag private information by a variety of reader-writer, which solves the two questions mentioned above. Firstly, a trust-security mechanism used to ensure that the readers in system are trustful. Next, via intercommunication of the readers, the secret key, which is produced by the tag-charged reader, is divided and distributed to the various rea
APA, Harvard, Vancouver, ISO, and other styles
17

Khusaini, Nurul Syuhadah. "Effectiveness of RFID Smart Library Management System." Journal of Mechanical Engineering SI 12, no. 1 (2023): 133–52. http://dx.doi.org/10.24191/jmeche.v12i1.24642.

Full text
Abstract:
Libraries are crucial for diverse resources, particularly for students and educators. The Library Management System (LMS) in Perpustakaan Raja Tun Uda (PRTU) still used barcode technology, which was inadequate and could increase the workload of the librarians. This study presented the development and evaluation of the Smart Portable Library Management System (SPLMS) using RFID technology. The study addressed the gap in the literature by focusing on the impact of angle adjustment on the performance of UHF RFID readers in reading RFID tags placed on book spines. The study was conducted by implem
APA, Harvard, Vancouver, ISO, and other styles
18

Sohn, Surgwon. "Channel Assignment for RFID Readers in Dense Reader Environments." Journal of the Korea Society of Computer and Information 18, no. 2 (2013): 69–76. http://dx.doi.org/10.9708/jksci.2013.18.2.069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hoa, Le Van, Nguyen Van Tung, and Vo Viet Minh Nhat. "An Approach to Hopfield Network-Based Energy-Efficient RFID Network Planning." Cybernetics and Information Technologies 24, no. 2 (2024): 50–66. http://dx.doi.org/10.2478/cait-2024-0015.

Full text
Abstract:
Abstract Radio Frequency IDentification (RFID) Network Planning (RNP) is the problem of placing RFID readers in a working area where a tag is interrogated by at least one reader and at the same time satisfies some constraints such as minimum number of placed readers, minimal interference, and minimal outside coverage. The RNP optimization has been proven NP-hard; thus, natural-inspired approaches are often used to find the optimal solution. The paper proposes an energy-efficient RNP approach in which the positions of placed readers are optimized by a Hopfield network, and the energy efficiency
APA, Harvard, Vancouver, ISO, and other styles
20

Ji, Wusheng, Li Li, and Weiwei Zhou. "Design and Implementation of a RFID Reader/Router in RFID-WSN Hybrid System." Future Internet 10, no. 11 (2018): 106. http://dx.doi.org/10.3390/fi10110106.

Full text
Abstract:
In order to put Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) in a hybrid system, this paper presents the design and implementation of a RFID reader/router that can obtain information of both RFID tags and WSN sensor nodes and transmit the information through the WSN to the PC server. The RFID reader and WSN router are combined with both hardware and software. In hardware structure, CC2530 is used as micro controller and RF module for ZigBee wireless communication, and MF RC522 is used as reader RF chip. The software deals with both identity and sensing information an
APA, Harvard, Vancouver, ISO, and other styles
21

Kheddam, Rafik. "SafeRFID-MW: a RFID Middleware with runtime fault diagnosis." Journal of Communications Software and Systems 9, no. 1 (2013): 57. http://dx.doi.org/10.24138/jcomss.v9i1.158.

Full text
Abstract:
In recent years, due to the proliferation of radio fre-quency identification (RFID) technology in everyday life, espe-cially in critical domains such as health care and transportation systems, significant efforts have been made to enhance the de-pendability of this technology. From these efforts have emerged specific techniques and several middleware solutions to handle the large amount of the RFID data. These solutions are not suita-ble for all RFID system requirements especially for issues related to critical domains. In this paper, we propose a novel fault-tolerant RFID middleware providing
APA, Harvard, Vancouver, ISO, and other styles
22

Jun-Bong Eom, Soon-Bin Yim, and Tae-Jin Lee. "An Efficient Reader Anticollision Algorithm in Dense RFID Networks With Mobile RFID Readers." IEEE Transactions on Industrial Electronics 56, no. 7 (2009): 2326–36. http://dx.doi.org/10.1109/tie.2009.2021869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Li Min. "A RFID Controller with Contactless Cards for Internet of Things." Applied Mechanics and Materials 336-338 (July 2013): 2521–24. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2521.

Full text
Abstract:
RFID system is a foundational component for the internet of things. Its applications are more and more popular, such as travel, retail, industry, defense, agriculture, storage and other fields. Controller or reader is an essential part for RFID applications. It can identify tags, process data and issue management instructions. Microcontrollers are common hardware for embedded applications. With microcontrollers, the RFID controller will be smart and easy to be used. In this paper, RFID, internet of things, contactless cards, readers, microcontrollers and design of a RFID controller with microc
APA, Harvard, Vancouver, ISO, and other styles
24

Jin, Xue Bo. "UKF Fusion Estimation for Indoor RFID Tracking." Applied Mechanics and Materials 427-429 (September 2013): 582–85. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.582.

Full text
Abstract:
Radio frequency identification (RFID) can effectively get the accurate location information for indoor tracking system. The readers cant be placed at any position in the practical system. the reader would be more intensive at some places, where will obtain measurements from several readers, while the reader will be placed less at others place, where less or no measurements may be get when the target gets in this area. Therefore the target trajectory should be estimated by fusion filtering methods with variable sensors. The experiments show that the fusion UKF with variable sensors can overcome
APA, Harvard, Vancouver, ISO, and other styles
25

Baashirah, Rania, and Abdelshakour Abuzneid. "SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography." Electronics 8, no. 10 (2019): 1166. http://dx.doi.org/10.3390/electronics8101166.

Full text
Abstract:
Internet of Things (IoT) is a new paradigm that has been evolving into the wireless sensor networks to expand the scope of networked devices (or things). This evolution drives communication engineers to design secure and reliable communication at a low cost for many network applications such as radio frequency identification (RFID). In the RFID system, servers, readers, and tags communicate wirelessly. Therefore, mutual authentication is necessary to ensure secure communication. Normally, a central server supports the authentication of readers and tags by distributing and managing the credenti
APA, Harvard, Vancouver, ISO, and other styles
26

Zradziński, Patryk. "Modelling and Evaluating Electromagnetic Field Exposure in the Multiple-Source Scenario of Using IoT HF RFID Readers." International Journal of Environmental Research and Public Health 19, no. 6 (2022): 3274. http://dx.doi.org/10.3390/ijerph19063274.

Full text
Abstract:
The aim of this study was to evaluate Specific Absorption Rate (SAR) and induced electric field (Ein) values in the model of a body of a person present near multiple HF RFID readers of a passive proximity integrated circuit card (PICC) working in an IoT application in a public transport vehicle, in order to test the hypothesis that even the simultaneous use of modelled readers does not cause electromagnetic field (EMF) exposure exceeding relevant limits provided for the evaluation of exposure of the general public. SAR and Ein values were evaluated under various exposure scenarios, designed to
APA, Harvard, Vancouver, ISO, and other styles
27

Fernandes, Benny. "Library Inventory Management System." International Scientific Journal of Engineering and Management 03, no. 04 (2024): 1–9. http://dx.doi.org/10.55041/isjem01691.

Full text
Abstract:
In today’s digital era efficient management of library inventories is imperative to streamline operation and improve user experience. This abstract introduces an innovative Library Inventory Management System utilizing Radio-Frequency Identification (RFID) technology to revolutionize the traditional library materials, enabling automated tracking, identification, and management of library resources. RFID readers strategically positioned throughout the library enable real time inventory updates, eliminating the need for manual scanning of individual items. The collected data is seamlessly integr
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Bo, Yiqi Zhuang, Xiaoming Li, and Weifeng Liu. "Design of a novel dual ports antenna to enhance sensitivity of handheld RFID reader." International Journal of Microwave and Wireless Technologies 8, no. 2 (2015): 369–77. http://dx.doi.org/10.1017/s1759078715000756.

Full text
Abstract:
A compact dual ports antenna with high isolation is proposed for handheld radio frequency identification (RFID) reader which is rarely reported in open literatures. Different with conventional handheld RFID reader antennas with single port, the proposed antenna transmits and receives signal separately. The proposed antenna operating with full duplex mode can enhance effectively sensitivity of reader, since the strong transmitting signal of reader with single port is usually highly coupled with weak receiving backscatter signal of tag. The antenna utilizes E-shaped aperture-coupled patch struct
APA, Harvard, Vancouver, ISO, and other styles
29

Le, Van Hoa. "An Optimal Model for Allocation Readers with Grid Cell Size and Arbitrary Workspace Shapes in RFID Network Planning." Journal of Internet Services and Information Security 14, no. 1 (2024): 180–94. http://dx.doi.org/10.58346/jisis.2024.i1.012.

Full text
Abstract:
RFID Network Planning (RNP) is the problem of deploying RFID readers within a workspace so that each tag can be covered by at least one reader. The objective of RNP is to determine the optimal positions of readers while satisfying certain constraints, such as maximum coverage, minimal interference, load balance among readers, etc. However, most previous studies considered the workspace rectangular or square and assumed a fixed number of readers. They then employed some heuristic methods to find the optimal reader positions. This approach is not practical because the workspace can have any shap
APA, Harvard, Vancouver, ISO, and other styles
30

Smit, Patel, Pawar Atharva, Shah Rushil, and Rathod Santosh. "Attendance System using RFID Technology." Recent Innovations in Wireless Network Security 4, no. 1 (2022): 1–5. https://doi.org/10.5281/zenodo.6476808.

Full text
Abstract:
<em>There has been tremendous growth in recent years in the sector of IOE and its applications. One such application is RFID. RFID stands for Radio Frequency Identification. There are many use cases being practiced in day to day lives of RFID such as in transportation, shopping malls, agriculture, factories, health-care and many more. Another application is a smart attendance system. The current traditional attendance system has many limitations which can be overcome with the help of RFID based attendance systems. This system consists of RFID scanners also called tags and RFID readers to offer
APA, Harvard, Vancouver, ISO, and other styles
31

Cao, Ziwen, Jinxing Xie, Siye Wang, et al. "An Effective and Robust Method for Unauthorized Reader Detection Based on Tag’s Energy." Wireless Communications and Mobile Computing 2022 (October 7, 2022): 1–13. http://dx.doi.org/10.1155/2022/6718689.

Full text
Abstract:
With the rapid development of the Internet of Things, ultra-high frequency (UHF) passive radio frequency identification (RFID) technology plays a vital role in various fields. UHF RFID faces unauthorized access attacks due to its long identification distance. Unauthorized readers can hide within a certain distance and use standard commands to read or modify tags. However, existing methods require additional equipment or are susceptible to environmental influences. In this paper, we make a novel attempt to counterattack unauthorized access. We propose a new method for Unauthorized Reader Detect
APA, Harvard, Vancouver, ISO, and other styles
32

Moshref, Mahmoud. "Improved Anti-Collision Algorithm for Tag Identification in Future Internet of Things." International Journal of Computer Network and Information Security 9, no. 3 (2017): 11–20. http://dx.doi.org/10.5815/ijcnis.2017.03.02.

Full text
Abstract:
The most important research in the world in these days, research that looking at the internet of thing's (IoT) topics and their applications. Most of these applications depend on RFID system, which includes RFID readers and tags. The important issues in RFID system or network are how we can reduce anti-collision between readers to identify and read tags data. In these paper, we suggest an Improved anti-collision protocol, which can be used to connect RFID readers with RFID tags and reduce the number of RFID tag's collisions. The simulation shows that an Improved Class-1 Generation 2 algorithm
APA, Harvard, Vancouver, ISO, and other styles
33

Ting, Ssu-Han, Chih-Kuang Wu, and Ching-Hsing Luo. "Design of Dual Mode RFID Antenna for Inventory Management and IV Fluid Level Warning System." International Journal of Antennas and Propagation 2017 (2017): 1–7. http://dx.doi.org/10.1155/2017/2470291.

Full text
Abstract:
Radio frequency identification (RFID) readers are powered RF devices that communicate with an RFID tag to read necessary information. Using this capability, a dual use system for short distance inventory management and moderate distance automatic warning system for low intravenous (IV) fluid levels is designed. The RFID is affixed on the IV drip bag; the fluid in bag affects the antenna transmission distance by fluid dielectric conditions. This allows for two different operational modes (moderate and short distance). For pharmaceutical management, a handheld RFID reader can be used for short d
APA, Harvard, Vancouver, ISO, and other styles
34

Cui, Yi Jun, Cheng Hua Wang, and Chun Lin Chen. "Design and Implementation of an Active RFID System Based on Bluetooth Low Energy." Applied Mechanics and Materials 325-326 (June 2013): 1774–77. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1774.

Full text
Abstract:
Active RFID systems are widely used in modern industries. Typical application of the active RFID system is the identification and the position tracking of warehouse and freight container. Traditional design methods of active RFID system need special RFID readers to read and write the active RFID tags. This paper presents a novel active RFID system that can be easily read by smart phones. This new active RFID system was based on Bluetooth Low Energy. In the system, any device equipped with Bluetooth 4.0 such as iPhone 4S or the android based smart phones can be used as the reader. It was easy t
APA, Harvard, Vancouver, ISO, and other styles
35

Arifin, Ajib Setyo, M. B. Fathinah Hanun, Eka Maulana, I. Wayan Mustika, and Fitri Yuli Zulkifli. "Design of a portable radio-frequency-identification reader capable to reading a user memory bank for smart-building energy management." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 3 (2021): 1538. http://dx.doi.org/10.11591/ijeecs.v23.i3.pp1538-1549.

Full text
Abstract:
Communication is an important factor in smart-building energy management (SBEM). Many communications technologies have been applied to SBEM, including radio-frequency identification (RFID). RFID has been used not only for identification but also for carrying information, which is stored in a user memory bank attached to the tag. To access the user memory bank, an RFID reader should comply with ISO 18000-6C standards. The greatest challenge of RFID-reader technology is its short communication range, which limits the sensing area. To overcome this problem, this paper proposes a portable RFID rea
APA, Harvard, Vancouver, ISO, and other styles
36

Arifin, Ajib Setyo, M. B. Fathinah Hanun, Eka Maulana, I. Wayan Mustika, and Fitri Yuli Zulkifli. "Design of a portable radio-frequency-identification reader capable to reading a user memory bank for smart-building energy management." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 3 (2021): 1538–49. https://doi.org/10.11591/ijeecs.v23.i3.pp1538-1549.

Full text
Abstract:
Communication is an important factor in smart-building energy management (SBEM). Many communications technologies have been applied to SBEM, including radio-frequency identification (RFID). RFID has been used not only for identification but also for carrying information, which is stored in a user memory bank attached to the tag. To access the user memory bank, an RFID reader should comply with ISO 18000-6C standards. The greatest challenge of RFID-reader technology is its short communication range, which limits the sensing area. To overcome this problem, this paper proposes a portable RFID rea
APA, Harvard, Vancouver, ISO, and other styles
37

Zuo, Yanjun. "Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains." International Journal of Handheld Computing Research 4, no. 4 (2013): 72–89. http://dx.doi.org/10.4018/ijhcr.2013100105.

Full text
Abstract:
Radio Frequency Identification (RFID) is an important wireless communication and pervasive computing technique used for automatic item identification and data capture. In this paper, we present a scheme for securely tracing material flow in supply chains using the inherent RFID authentication and data logging capability. The scheme provides not only an overall path tracing and verification through the entire supply chain, but also the product identification within the scope of a supply chain partner. RFID tags and readers are deployed to ensure that only authorized supply chain partners can id
APA, Harvard, Vancouver, ISO, and other styles
38

Dash, Lucy, Sayan Sen Sarma, Koushik Sinha, and Bhabani P. Sinha. "A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems with Multiple Readers." International Journal of Wireless & Mobile Networks 14, no. 2 (2022): 17–31. http://dx.doi.org/10.5121/ijwmn.2022.14202.

Full text
Abstract:
In this paper, we propose a Voronoi diagram based spatio-temporal data redundancy elimination approach for RFID systems having multiple readers so that every RFID tag will be read by only one reader depending on the distance between the tag and the center of the Minimum Enclosing Circle (MEC) of the Voronoi cell which the reader belongs to. Thus, the spatial redundancy in the gathered data is completely eliminated. Temporal redundancy is also minimized by reading the RFID tags at regular time intervals larger than an appropriately chosen threshold value. Existing methods of reducing data redun
APA, Harvard, Vancouver, ISO, and other styles
39

Lucy, Dash Sayan Sen Sarma Koushik Sinha Bhabani P. Sinha. "A Novel Spatio-Temporal Data Redundancy Elimination Approach for RFID Systems with Multiple Readers." International Journal of Wireless & Mobile Networks (IJWMN) 14, no. 2 (2022): 15. https://doi.org/10.5281/zenodo.6538525.

Full text
Abstract:
In this paper, we propose a Voronoi diagram based spatio-temporal data redundancy elimination approach for RFID systems having multiple readers so that every RFID tag will be read by only one reader depending on the distance between the tag and the center of the Minimum Enclosing Circle (MEC) of the Voronoi cell which the reader belongs to. Thus, the spatial redundancy in the gathered data is completely eliminated. Temporal redundancy is also minimized by reading the RFID tags at regular time intervals larger than an appropriately chosen threshold value. Existing methods of reducing data redun
APA, Harvard, Vancouver, ISO, and other styles
40

Floerkemeier, Christian, and Elgar Fleisch. "RFID Applications: Interfacing with Readers." IEEE Software 25, no. 3 (2008): 67–70. http://dx.doi.org/10.1109/ms.2008.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

K, Ashwini. "Customised Toolbox Using RFID Readers." International Journal of Engineering Research in Electronics and Communication Engineering 9, no. 6 (2022): 18–21. http://dx.doi.org/10.36647/ijerece/09.06.a003.

Full text
Abstract:
The manufacturing of automated machines is done by skilled engineers with the required tools in reach at time and place of easy reach. Tool misplacing is a phenomenon that is leading to efficiency loss of 20-25% working hours which is indirectly related to cost to company. Toolbox and tool chest have a definite position and slot for each size and type of tool. Due to day to day increasing non track-ability of tools, a RFID Arduino circuit which checks the employee details and grants access to the toolbox/tool chest. This methodology can be used for service engineer SPC tracking. This integrate
APA, Harvard, Vancouver, ISO, and other styles
42

Belkacem, Imad, Safia Nait Bahloul, and Oum-El-Kheir Aktouf. "Data Analysis of an RFID System for Its Dependability." International Journal of Embedded and Real-Time Communication Systems 5, no. 3 (2014): 1–22. http://dx.doi.org/10.4018/ijertcs.2014070101.

Full text
Abstract:
Dependability issues become more and more significant in RFID (Radio Frequency Identification) development and especially in critical domains. However, Operations of reading, detection of readers, and measurements of sensors in a RFID system are inevitably subjected to errors. These factors degrade the overall dependability of RFID systems. The authors study the Fault Tolerance in RFID systems as a means to ensure the dependability. The authors propose to perform a statistical analysis on the RFID tags data, using a confidence interval, at the level of the middleware enabling the detection of
APA, Harvard, Vancouver, ISO, and other styles
43

Dr. Khaled Al-Buraihi, Dr Khaled. "Dynamic RFID Data Filtering and Application." مجلة جامعة الملكة أروى العلمية المحكمة 1, no. 25 (2023): 18. http://dx.doi.org/10.58963/qausrj.v1i25.104.

Full text
Abstract:
Radio frequency Identification “RFID” Technology uses the radio frequency waves to transfer the RFID data between RFID readers and tags which are used to identify objects/employees without line of sight. The RFID data which is captured by the tag reader may contain false readings, noise, and duplicates which implies data filtering and cleaning. Therefore, it is necessary to develop efficient processing algorithms of RFID data. This pa-per presents a dynamic technique to filter the RFID data, elimi-nate duplicates and filter noise. Data filtering during employee identification in the work place
APA, Harvard, Vancouver, ISO, and other styles
44

De Donno, Danilo. "Unconventional UHF RFID Tags with Sensing and Computing Capabilities." Journal of Communications Software and Systems 10, no. 2 (2014): 83. http://dx.doi.org/10.24138/jcomss.v10i2.128.

Full text
Abstract:
The design of fully-passive UHF RFID tags preserving cost-effectiveness, yet supplying augmented capabilities, represents an ambitious and stimulating challenge, as such devices would pave the way to a large class of applications where identification, computation, automatic cognition, and wireless sensing are required. In this work, two solutions are proposed. The former, named RAMSES, is optimized for RFID-based sensing and relies on a novel approach exploiting a new-generation I2C-UHF RFID chip. RAMSES is able to write sensor data into the EPC and communicate up to 5 m of distance from a con
APA, Harvard, Vancouver, ISO, and other styles
45

Mafamane, Rachid, Mourad Ouadou, Hajar Sahbani, Nisrine Ibadah, and Khalid Minaoui. "DMLAR: Distributed Machine Learning-Based Anti-Collision Algorithm for RFID Readers in the Internet of Things." Computers 11, no. 7 (2022): 107. http://dx.doi.org/10.3390/computers11070107.

Full text
Abstract:
Radio Frequency Identification (RFID) is considered as one of the most widely used wireless identification technologies in the Internet of Things. Many application areas require a dense RFID network for efficient deployment and coverage, which causes interference between RFID tags and readers, and reduces the performance of the RFID system. Therefore, communication resource management is required to avoid such problems. In this paper, we propose an anti-collision protocol based on feed-forward Artificial Neural Network methodology for distributed learning between RFID readers to predict collis
APA, Harvard, Vancouver, ISO, and other styles
46

Charles, Joel. "A Review: RFID Smart Parking System Using IOT." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (2022): 138–40. http://dx.doi.org/10.22214/ijraset.2022.40203.

Full text
Abstract:
Abstract: These technologies are RFID readers, RFID writers, RFID barcode readers, RFID smart sensors, and RFID controllers. In this study, a solution was provided to the problems encountered in parking management systems using technology. RFID.RFID readers, RFID tags, computers, barriers, and software are used as the main components of RFID technology. The software was managed for the management, control, transaction reporting, and operation of parking lots located in different parts of the city. Check-in and check-out operations will be controlled using RFID readers, tags, and barriers. Than
APA, Harvard, Vancouver, ISO, and other styles
47

Cho, Hyuntae, and Yunju Baek. "Reader collision avoidance for multihop deployment of active RFID readers." IEICE Electronics Express 7, no. 18 (2010): 1396–402. http://dx.doi.org/10.1587/elex.7.1396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Kumar, Adarsh, Krishna Gopal, and Alok Aggarwal. "Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things." Journal of Communications Software and Systems 10, no. 3 (2017): 179. http://dx.doi.org/10.24138/jcomss.v10i3.122.

Full text
Abstract:
Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identification (RFID) is one the important radio frequency based addressing scheme in IoT. Major security challenge in resource constraint RFID networks is how to achieve traditional CIA security i.e. Confidentiality, Integrity and Authentication. Computational and communication costs for Lightweight Mutual Authentication Protocol (LMAP), RFID mutual
APA, Harvard, Vancouver, ISO, and other styles
49

Deng, Jian Xin. "An Architecture of the Vehicle Tracking System Based on RFID." Applied Mechanics and Materials 278-280 (January 2013): 1653–57. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.1653.

Full text
Abstract:
Vehicle tracking plays more important roles in modern transportation and logistics operation. This paper deals with a new approach to track vehicles based on RFID (Radio Frequency Identification) technology. The basic steps of vehicle tracking based on RFID are introduced and a six-layered architecture for the vehicle tracking system integrating databases, RFID tags, RFID readers, data centers, networks and user interface is presented, where the positions of vehicles are attained directly by compared the RFID readers collecting vehicle RFID tags with their position information in the database.
APA, Harvard, Vancouver, ISO, and other styles
50

Pradeepa, D., R. Valarmady, and S. G Rajasekar. "Elegant System for Library Management using RFID." International Journal of Engineering & Technology 7, no. 3.1 (2018): 133. http://dx.doi.org/10.14419/ijet.v7i3.1.16816.

Full text
Abstract:
Radio Frequency Identification (RFID) implies a system that exchanges the data remotely, utilizing radio frequency waves. It is programmed identification innovation. This paper is about RFID based system for library management that permits quick exchange stream and will make simple to deal with the exercises like issue and return of books from the library absent much manual intercession. This system depends on RFID readers and detached RFID tags that can store the data electronically which can be perused by the RFID readers. This system will influence clients to issue to and return of books th
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!