Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Security system RFID Tags.

Дисертації з теми "Security system RFID Tags"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 дисертацій для дослідження на тему "Security system RFID Tags".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Al-Adhami, Ayad. "A secure quorum based multi-tag RFID system." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/12821.

Повний текст джерела
Анотація:
Radio Frequency Identification (RFID) technology has been expanded to be used in different fields that need automatic identifying and verifying of tagged objects without human intervention. RFID technology offers a great advantage in comparison with barcodes by providing accurate information, ease of use and reducing of labour cost. These advantages have been utilised by using passive RFID tags. Although RFID technology can enhance the efficiency of different RFID applications systems, researchers have reported issues regarding the use of RFID technology. These issues are making the technology
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Modaresi, Mahyar. "System and Method for Passive Radiative RFID Tag Positioning in Realtime for both Elevation and Azimuth Directions." Thesis, KTH, Communication Systems, CoS, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-24562.

Повний текст джерела
Анотація:
<p>In this thesis, design and realization of a system which enables precise positioning of RFID tags in both azimuth and elevation angles is explained. The positioning is based on measuring the phase difference between four Yagi antennas placed in two arrays. One array is placed in the azimuth plane and the other array is perpendicular to the first array in the elevation plane. The phase difference of the signals received from the antennas in the azimuth array is used to find the position of RFID tag in the horizontal direction. For the position in the vertical direction, the phase difference
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Mirowski, L. "Detecting Clone Radio Frequency Identification Tags." Thesis, Honours thesis, University of Tasmania, 2006. https://eprints.utas.edu.au/792/1/Detecting_Clone_Radio_Frequency_Identification_Tags.pdf.

Повний текст джерела
Анотація:
The theft of Radio Frequency Identification (RFID) tag identity, commonly referred to as tag cloning, is a serious threat to RFID systems. It can enable an attacker to gain access to a secure facility, make fraudulent purchases, or disrupt supply chains. It may even enable crimes like financial gain, people smuggling, and drug trafficking, terrorism and money laundering. Presently there is no practical solution to defend against tag cloning. This thesis details research that aims to detect the presence of clone tags which may be the first step in defending against them and preventing RFID-
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Abdelmalek, Omar. "Conception et prototypage d'architectures robustes de tags RFID UHF." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAT088/document.

Повний текст джерела
Анотація:
Les systèmes RFID sont de plus en plus utilisés dans des applications critiques fonctionnant dans des environnements perturbés (ferroviaire, aéronautique, chaînes de production ou agroalimentaire) ou dans des applications où la sécurité est essentielle (identification, lutte contre la contrefaçon). Pourtant, ces systèmes faibles coûts, initialement conçus pour des applications de masse non critiques, sont peu robustes par nature. Pour les applications critiques, les défaillances des puces RFID peuvent avoir des conséquences catastrophiques ou créer des failles de sécurité importantes. Ces défa
Стилі APA, Harvard, Vancouver, ISO та ін.
5

CAIZZONE, STEFANO. "Sensing and communication potentialities of coupled RFID tags." Doctoral thesis, Università degli Studi di Roma "Tor Vergata", 2014. http://hdl.handle.net/2108/203634.

Повний текст джерела
Анотація:
The upcoming Internet of Things is realizing the vision of a fully connected world: one of the key enablers for such technological revolution is the development of low-cost long-lasting sensors, able to become the physical interface to the real-world. In such a quest, the Radio Frequency Identication (RFID) is establishing itself as the most promising technology for passive sensing, thanks to its standardized communication protocol and its massive use in nowaday's logistics, which has driven down the costs of commercial components. The extensive research eort of the latest years on the
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Mughal, Aiman. "Statistical analysis of the coupling effects between tags in the RFID links." Electronic Thesis or Diss., Université Gustave Eiffel, 2024. http://www.theses.fr/2024UEFL2002.

Повний текст джерела
Анотація:
Différentes études empiriques montrent que l'effet du couplage mutuel et la position et l'orientation aléatoires des antennes tags dans un volume réduit entraînent une dégradation des indicateurs de performance d'un système RFID, tels que la distance et le taux de lecture. Cette thèse participe à l'analyse des performances d'un tel système RFID en explorant les phénomènes physiques à l'origine de la dégradation et en introduisant des techniques statistiques dans les investigations. Avant de procéder à l'étude du comportement de groupe, la sensibilité et l'impédance de deux puces RFID (Higgs-3
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Zancanaro, Mario Antônio. "Identification des éléments RFID mobiles dans les environnements intérieurs associant la couche application et la couche physique." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066730.

Повний текст джерела
Анотація:
Les recherches autours la localisation d’étiquettes RFID dans des environnements intérieurs (indoor) ont suggéré plusieurs algorithmes et techniques. Identifier des étiquettes RFID dans les environnements intérieurs avec une parfaite précision n’est pas une tâche facile pour de nombreuses applications dans l'industrie, les supermarchés ou encore dans la logistique. Les systèmes de localisation RFID ont évolué en raison de l’augmentation de la popularité des applications qui nécessitent ce type de ressource. En effet, de nombreux procédés ont manifesté le besoin d'identifier et de localiser des
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Holland, William S. "Development of an Indoor Real-time Localization System Using Passive RFID Tags and Artificial Neural Networks." Ohio University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1249062541.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Zancanaro, Mario Antônio. "Identification des éléments RFID mobiles dans les environnements intérieurs associant la couche application et la couche physique." Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066730.

Повний текст джерела
Анотація:
Les recherches autours la localisation d’étiquettes RFID dans des environnements intérieurs (indoor) ont suggéré plusieurs algorithmes et techniques. Identifier des étiquettes RFID dans les environnements intérieurs avec une parfaite précision n’est pas une tâche facile pour de nombreuses applications dans l'industrie, les supermarchés ou encore dans la logistique. Les systèmes de localisation RFID ont évolué en raison de l’augmentation de la popularité des applications qui nécessitent ce type de ressource. En effet, de nombreux procédés ont manifesté le besoin d'identifier et de localiser des
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Rohatgi, Anil. "Implementation and Applications of an Anti-Collision Differential-Offset Spread Spectrum RFID System." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/13946.

Повний текст джерела
Анотація:
This report documents the design, construction, and implementation of a differential-offset spread spectrum RFID system, to avoid the problem of anti-collision interference from multiple RFID tags. Currently in industry, this problem is handled by establishing a two way communication link between the tags and the interrogator. The proposed system eliminates the need for the excessive hardware use to create this link, and therefore drastically reduces the cost of each tag. Not only is this system cheaper to implement but it is faster, requires less power, and by the nature of the design contai
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Leemaqz, Kaleb Lee. "Privacy of RFID - models and protocols." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/60900/1/Kaleb_Leemaqz_Thesis.pdf.

Повний текст джерела
Анотація:
Radio Frequency Identification is a wireless identification method that utilizes the reception of electromagnetic radio waves. This research has proposed a novel model to allow for an in-depth security analysis of current protocols and developed new flexible protocols that can be adapted to offer either stronger security or better efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Andia, Vera Gianfranco. "Analyse et exploitation des non linéarités dans les systèmes RFID UHF passifs." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENT052/document.

Повний текст джерела
Анотація:
Avec l'explosion de l'Internet des Objets (IoT), de nouveaux dispositifs permettant de tagguer les objets sont nécessaires afin de permettre non seulement leur identification mais aussi d'assurer des communications fiables et de nouvelles fonctionnalités comme la détection, la localisation ou la capture d'informations. Cette tendance s'appuie sur la technologie bien établie qu'est la radiofréquence par identification (RFID) et donc l'utilisation d'étiquettes (ou tags) faibles coûts et télé-alimentés. Dans ce contexte, de nombreux travaux au niveau de la couche d'application se tournent vers la
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Mudakkarappilli, Sudersanan Jithin. "Accurate experimental and numerical characterization of the forward and reverse RFID links for strongly coupled tags including nonlinearity of chip impedance." Electronic Thesis or Diss., Université Gustave Eiffel, 2024. http://www.theses.fr/2024UEFL2029.

Повний текст джерела
Анотація:
Le contexte de cette thèse aborde les scénarios RFID UHF impliquant la mise en jeux d'un grand nombre de tags. Ces tags sont d'une part distribués de manière aléatoire et d'autre part concentrés dans un volume électriquement réduit. Dans cette situation, la proximité des éléments rayonnants entraîne un couplage électromagnétique important entre les antennes des tags, impactant le lien radio entre le lecteur et chaque tag. Par conséquent, on observe généralement une dégradation des indicateurs de performance clés du système, tels que la distance maximum de lecture ou le taux de lecture. Ce trav
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Mota, Rafael Perazzo Barbosa. "Extensões ao protocolo de comunicações EPCGloboal para tags Classe 1 utilizando autenticação com criptografia de baixo custo para segurança em identificação por radiofrequencia." Universidade Federal de São Carlos, 2006. https://repositorio.ufscar.br/handle/ufscar/312.

Повний текст джерела
Анотація:
Made available in DSpace on 2016-06-02T19:05:17Z (GMT). No. of bitstreams: 1 DissRPBM.pdf: 1011856 bytes, checksum: 715ebb8b484f0962fc766a3efbebb601 (MD5) Previous issue date: 2006-05-31<br>Financiadora de Estudos e Projetos<br>EPCGlobal communication protocol for RFID (Radio Frequency Identification) does not ensure security and privacy for its system users. This fact makes possible several kinds of security problems on RFID technology usage justifying that security mechanisms should be added to communication protocol preserving the existing standards. This work proposal is based on communi
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Floriano, Sanchez Sergio. "A Self-organized Wireless Sensor Network (WSN) for a Home-event Managed System : Design of a cost efficient 6LoWPAN-USB Gateway with RFID security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186384.

Повний текст джерела
Анотація:
Wireless Sensor Networks (WSN) have existed for many years in industry applications for different purposes but their use has not been fully extended to the global consumers. Sensor networks have lately resulted to be greatly helpful to people in everyday life, specially in home automation applications for monitoring events, security, and control of devices and different elements in the house by using actuators. One of the main barriers to overcome in order to increase their popularity and achieve an worldwide deployment are costs and integration within other networks. This Thesis investigates
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Herold, Radek. "Bytová zabezpečovací ústředna." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218305.

Повний текст джерела
Анотація:
In the opening part of this thesis, the reader is briefly introduced into safety technique devices. There are basic types of security sensors discussed together with the most common methods of their connection with the security central. Further text focuses on elaborating the main topic of this thesis - the design of home security central equipped with a WiFi interface.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Muwanguzi, Mark. "Security framework for low cost RFID tags." Thesis, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000289.

Повний текст джерела
Анотація:
Thesis (MTech. degree in Computer Systems) -- Tshwane University of Technology, 2010.<br>Radio Frequency Identification (RFID) systems are becoming more popular today, especially in first world countries. This is a result of the systems wide range of applications. RFID technology is used in several industries, such as: transport, sport, medicine and government institutions. The advantages that the technology offers promote its widespread use and implementation in various industries. RFID systems have the capacity to store more information than other identification technologies (for example bar
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Chang, Zhong-Zhi, and 張忠智. "A Study on the Security of Logistic Warehouse System using Passive RFID Tags." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/31909442253739895210.

Повний текст джерела
Анотація:
碩士<br>中國文化大學<br>數位機電科技研究所<br>98<br>The RFID system has been widely used in our daily life, such as MRT and public bus easy card, pet’s implanted microchip, highway ETC (Electronic Toll Collection), building access control card, and Visa payWave card. Recently, logistic warehouse management system has begun using RFID for tracking goods. This study will discuss the security of logistic warehouse system using passive RFID tags and propose a security mechanism. First, we establish a system model to describe how to build a back-end database according to the information of goods supplier, stock dat
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Widi, Yorheza R., and YorhezaR Widi. "Security Cryptography for Low-Cost RFID Tags." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/90139636708783343600.

Повний текст джерела
Анотація:
碩士<br>亞洲大學<br>資訊工程學系碩士班<br>95<br>Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. Today RFID use in many application, especially in supply chain which they can improve the efficiency start from manufacturing plant until POS (Point of Sales) . However, despite these promises, the possible abuse by retailers and government agencies of RFID's tracking capability raises questions about potential violations of personal privacy. Now more RFID security feature have been propose
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Singh, Hakim. "Tag-Reader Authentication Scheme for RFID Systems." Thesis, 2015. http://ethesis.nitrkl.ac.in/7098/1/Tag_Singh_2015.pdf.

Повний текст джерела
Анотація:
Radio frequency Identification (RFID) system is latest a technology. It has been used in various applications in the world. Radio frequency identification (RFID) can be used in supply chain management, automated payment systems and other daily application as essential technology to enhance lives of human beings. RFID systems are vulnerable for many malicious attacks against privacy and security. To solve these problems, many authentication protocols based on cryptography scheme have been developed in order to ensure preservation of privacy. However, many of the these approaches cannot fully pr
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Kaleem, Muhammad Khizer. "Physical Layer Approach for Securing RFID Systems." Thesis, 2013. http://hdl.handle.net/10012/7702.

Повний текст джерела
Анотація:
Radio Frequency IDentification (RFID) is a contactless, automatic identification wireless technology primarily used for identifying and tracking of objects, goods and humans. RFID is not only limited to identification and tracking applications. This proliferating wireless technology has been deployed in numerous securities sensitive applications e.g. access control, e-passports, contactless payments, driver license, transport ticking and health cards. RFID inherits all the security and privacy problems that are related to wireless technology and in addition to those that are specific to RFI
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Wen, Chia-Ying, and 溫佳穎. "Study of RFID Application System Security." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/13014505082096224202.

Повний текст джерела
Анотація:
碩士<br>國防大學理工學院<br>電子工程碩士班<br>98<br>RFID technology is widely adopted by many automation industries for improving operation efficiency. However, RFID applications still possess many security issues worthy of investigation. Generally, a RFID application can be divided into four parts, including a RFID tag, a reader, a middleware and a system server. The security mechanisms between each part of a RFID application are discussed and analyzed in this research. In recent years, large quantities of low-cost passive RFID tags are used for inventory management. The chip inside a passive RFID tag provide
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Ou, Hsiang Yun, and 歐享昀. "A Study on a Lightweight RFID Protocol with Privacy and Security Protection for Low-cost Tags." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/27078207545704838497.

Повний текст джерела
Анотація:
碩士<br>長庚大學<br>資訊管理學研究所<br>97<br>Radio Frequency Identification (RFID) is an example of the most promising technology. The RFID technology is believed to change our lifestyle and habits, and very likely triggers a revolution in the supply chain environment. Although the prospects of the RFID are brightening, but low-cost hardware tags have great limitations in computing power. Traditional cryptographic algorithms like AES and RSA cannot be used in low-cost RFID tags. For widespread application, the potential security and privacy issues must be addressed. This thesis proposes a lightweight authe
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Hsu, Ming-Hsiu, and 徐敏修. "Designing Self-Guiding Robot with Assistance of RFID tags and WiFi Localization System." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/16400558648202087377.

Повний текст джерела
Анотація:
碩士<br>國立交通大學<br>資訊學院碩士在職專班資訊組<br>98<br>We consider building an indoor low-cost mobile robot that can be used in home or office applications. Due to the complication and dynamic changing nature of a home/office environment, it is essential for such a robot to be self-guiding in the sense that it is able to determine its current location as well as navigate to locations which it is commanded to. By integrating with wireless communication, indoor localization, and RFID technologies, it is possible to build a self-guiding robot at low cost. We propose an architecture to achieve this goal at centim
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Hsiao, Shiann-Tsong, and 蕭憲聰. "Implementing a Property Security System by Using RFID." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/37944941951609187876.

Повний текст джерела
Анотація:
碩士<br>亞洲大學<br>資訊工程學系碩士班<br>95<br>This research is how to implement a property security system by using RFID technology. After implementing this system, users carrying just one ID card are able to pass security gates with conveniently and promptly. Since year 2003, RFID has been enlisted into top ten significant innovations in twenty-first century. It not only improves industrial technology in history, but also changes human’s consuming behavior in the market. In year 2004, Wal-Mart, the American largest retailer department store, required its top hundred suppliers to introduce RFID into shoppi
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Tsai, Chou-Wei, and 蔡宙瑋. "A RFID Technology Based Firearm Instant Security System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/70778337147799231912.

Повний текст джерела
Анотація:
碩士<br>嶺東科技大學<br>資訊科技應用研究所<br>100<br>The armed robberies often cause serious social problems. Based on the radio frequency identification (RFID) technology, this research designs an instant security system for guns to prevent armed robbery from threatening lives. The RFID chip contains a unique identification code along with the mutual authentication of the tag and the reader provides the most secured feature. This research, based on the RFID characteristic, places the RFID reader in an appropriate position of the guns and develops a gun security mechanism. When getting a gun, the RFID system s
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Chen, Li-Jhong, and 陳立忠. "An eBook Security System Based on RFID Technology." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/93764738417574694824.

Повний текст джерела
Анотація:
碩士<br>嶺東科技大學<br>資訊科技應用研究所<br>98<br>RFID is a system that transmits the identity of an object or person wirelessly, using radio waves; the RFID technology does not require contact or line of sight for communication; RFID data can be read through the human body, clothing and non-metallic materials. The RFID technology can be found in Supply Chain management, Security and Access Control, Warehouse management, Medical care, Transportation management, Library and Archive, Automatic control and Electronic Tickets stored-values, etc. With government promoting the RFID technology for the past 10 years
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Mota, Rajesh Kumar. "Role of Cryptographic Welch-Gong (WG-5) Stream Cipher in RFID Security." Thesis, 2012. http://hdl.handle.net/10012/6769.

Повний текст джерела
Анотація:
The purpose of this thesis is to design a secure and optimized cryptographic stream cipher for passive type Radio Frequency Identification (RFID) tags. RFID technology is a wireless automatic tracking and identification device. It has become an integral part of our daily life and it is used in many applications such as electronic passports, contactless payment systems, supply chain management and so on. But the information carried on RFID tags are vulnerable to unauthorized access (or various threats) which raises the security and privacy concern over RFID devices. One of the possible solutio
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Hung, Chin-Maio, and 洪菁苗. "A Study of RFID Gate Security System And Attendance Evaluation System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/63998722961892523759.

Повний текст джерела
Анотація:
碩士<br>義守大學<br>資訊管理學系碩士班<br>96<br>With the progressive development of the Radio Frequency Identification (RFID) technology and its communication protocols in recent years, the applications of RFID in many relevant fields have been blooming, such as traffic surveillance, storage management, gate security, tracking mail container, personal ID system, and electronic currency, etc. Based on the features of RFID technique that is capable of correctly and quickly identifying and recording corporate employees, this system combine “Personnel Attendance and Evaluation System” and “RFID Gate Security Sys
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Atojoko, Achimugu A., N. M. Jan, Fauzi Elmegri, Raed A. Abd-Alhameed, Chan H. See, and James M. Noras. "Energy efficient gully pot monitoring system using radio frequency identification (RFID)." 2013. http://hdl.handle.net/10454/9621.

Повний текст джерела
Анотація:
No<br>Sewer and gully flooding have become major causes of pollution particularly in the residential areas majorly caused by blockages in the water system and drainages. An effective way of avoiding this problem will be by deploying some mechanism to monitor gully pot water level at each point in time and escalating unusual liquid levels to the relevant authorities for prompt action to avoid a flooding occurrence. This paper presents a low cost power efficient gully pot liquid level monitoring technique. Passive RFID tags are deployed and signal variation from the Alien Reader Software are use
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Syaukani, Ahmad, and Ahmad Syaukani. "Security Management System For Critical Prison By Using RFID." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/58333756923788535585.

Повний текст джерела
Анотація:
碩士<br>亞洲大學<br>資訊工程學系碩士班<br>95<br>There is no method of identification for situations that require an extremely fast, reliable method of ensuring someone is who you think they are. Most forms of identification rely on paper records that can get mixed up or misplaced, both of which Produce dire consequences in certain situations. Our project aims to solve this problem by creating a method of identification that immediately retrieves a person's identity and their history using radio frequency identification (RFID) technology. This thesis research we have designed a system that interface RFID and
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Wang, Cheng-Cheng, and 王正誠. "Design of Indoor Multi-zone Positioning System Using Three-dimensional Reference Tags Based on RFID." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/ks7dde.

Повний текст джерела
Анотація:
碩士<br>國立臺北科技大學<br>資訊工程系研究所<br>100<br>In recent years, many researchers applied different technologies to perform the indoor positioning. However, the use of RFID technology for indoor positioning is a relatively new one. In terms of using RFID technology, LANDMARC is the earliest work and also the most popular one being referred. It was based upon the returned signal strength(RSS) from reference tags on given locations to estimate the position of an unknown tag, so it does not require expensive equipment. But the indoor environment is more complex than the outdoors’s, the weakened signal stren
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Wu, Tsung-Hsien, and 吳宗憲. "The Impelementation of Embeded CDI Security System by Using RFID." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/9es29q.

Повний текст джерела
Анотація:
碩士<br>國立高雄應用科技大學<br>電子與資訊工程研究所碩士班<br>95<br>The purpose of this dissertation is to provide a convenient and a secure method for preventing that the vehicle was stolen by illegal start. To this end, this dissertation proposes a novel anti-theft mechanism for motorcycles, which the transmission interface is based on RFID (Radio Frequency Identification) technology. The hardware is integrated the RFID device with CDI (Capacitor Discharge Ignition) to control the spark wire so that the defect of general anti-theft device can be improved.To guarantee the security in transferring data, the software d
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Heng-HuaLiu and 劉恒華. "A Novel Blocking scheme for one time Identification of large-scale staying tags in RFID system." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/drwtg5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Huang, Ching-Fu, and 黃慶福. "Design of Access Control System of Using RFID Multiple Security Mechanisms." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/7vw46w.

Повний текст джерела
Анотація:
碩士<br>國立東華大學<br>資訊工程學系<br>96<br>Radio Frequency Identification (RFID) is a popular technology in recently decade. The technology spreads the applications to all the various enterprises and occupations, there is a developed tendency towards the more applications. The advanced countries in the world, they take the technology as their national key developmental project. They invest massive manpower and the funds to verify the international standard revision of EPC, ISO even the UID, and hope that can lead the market trend. However, current RFID protocols are designed to optimize performance and
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Jie, Chen Shih, and 陳仕傑. "Designing a Low-Cost RFID System with Security and Privacy Protection." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/07786830873071497993.

Повний текст джерела
Анотація:
碩士<br>長庚大學<br>資訊管理研究所<br>94<br>Radio Frequency Identification (RFID) system has become pervasive in the past few years. It is often used in supply chain management, logistics, healthcare management and biochips identification and tracking. The American department store, Wal-Mart, insisted their first 100 suppliers to deploy RFID on their product packages and shelves by 2005. Wal-Mart has the 20% of retail sales in the world and 60% of retail sales in American. Wal-Mart predicts that RFID implementation will reduce inventory and labor errors and cost for about 8.4 billions U.S. dollars a year.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Liu, Hsu-chien, and 劉繻謙. "Implementing a security system based on the RFID technology -- A Case Study." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/11964635245274897697.

Повний текст джерела
Анотація:
碩士<br>國立中央大學<br>工業管理研究所碩士在職專班<br>95<br>Science and technology come from the human nature all the time '', people''s pursuit and probing into from ancient times to the present to the novel things never changes, the achievement of the income always makes people highly praise to make great efforts after pursuing, because there is the motive force, then there is flourishing development in succession of a lot of behavior science fields. RFID (Radio Frequency Identification ) of the ones that have already come out during World War II, after entering 21st century, because the multiple characteristics
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Liu, Zhao-Qing, and 劉昭慶. "A Study on Security and Privacy Protection for Low-Cost RFID System." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/65256476556593572512.

Повний текст джерела
Анотація:
碩士<br>長庚大學<br>資訊管理研究所<br>95<br>Radio Frequency Identification (RFID) system is a technology used mainly for automatic identification of human and objects. RFID has not only begun to replace the Bar Code system in recent years, but has also developed toward diversity, such as supply chain management (SCM), logistics management, the medical industry and more. Wal-Mart is a prime example of the system’s application Wal-Mart required its top 100 suppliers to integrate RFID technology by 2005 to enable cost reductions by as much as USD8.4 billion per year. In addition, U.S. Department of Defense (D
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Mahapatra, Surya Narayan. "Security Issues and ASIC Implementation Of An EPC C1G2 Complaint Authentication Protocol In RFID System." Thesis, 2017. http://ethesis.nitrkl.ac.in/9073/1/2017_MT_SNMahapatra.pdf.

Повний текст джерела
Анотація:
In this paper we investigate the privacy and security threats possible to RFID systems. Here we have proposed a new authentication protocol which provides all the features to preserve all kinds of attack and threats. Since information communication via radio} transmission can be easily} eavesdropped, therefore, many radio frequency identification (RFID) security mechanisms for location privacy protection have been proposed recently. However, most of previously proposed schemes do not conform to the EPC Class-1 GEN-2 standard for passive RFID tags as they require the implementation}of hash func
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Hsieh, Yi-Fang, and 謝宜芳. "The Acceptance of the RFID Security Technology Applied in UGY System for Intern." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/43626584407111317663.

Повний текст джерела
Анотація:
碩士<br>嶺東科技大學<br>資訊科技應用研究所<br>100<br>Medical industry began to adapt the radio frequency identification (RFID) technology which becomes a future topic. Many hospitals also become increasingly common. However, the adoption of RFID in the hospital can enhance patient safety and reduce cases of medical negligence. But, there are some obstacles to the adoption of RFID in the hospital, some medical staff are resistant to use the RFID system. This study intends to use the technology acceptance model (TAM)、TAM II and information systems success model as the main framework and probes into the acceptanc
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Mirowski, L. "A whole of system approach to analysis of security in RFID Systems using an integrated layered and partitioned reference model." Thesis, 2011. https://eprints.utas.edu.au/11724/1/Mirowski_Thesis.pdf.

Повний текст джерела
Анотація:
This thesis proposes the use of a ‘whole of system’ approach to the analysis of security in Radio Frequency Identification (RFID) systems and introduces a reference model for this purpose. It illustrates the advantages of this approach in the context of detecting clone tags within RFID systems, including the specific example of a pharmaceutical supply chain. It compares the results from using the proposed model with those from previous work that adopted a more localised approach (Rotter 2008; Mitrokotsa et al. 2010). In order to enable the ‘whole of system’ approach, a domain model for RFID sy
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Tseng, Chin-Hung, and 曾智鴻. "A Study of the RFID Door Security System in the University Sports Center use intention." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/64131653803115479459.

Повний текст джерела
Анотація:
碩士<br>國立勤益科技大學<br>研發科技與資訊管理研究所<br>101<br>In recent years, the application of Radio Frequency Identification (RFID) technology has been used in related field of innovative service applied research development. The industry which has partly human operation has gradually been replaced by technology products, and it obviously becomes the current trend. However, only a few researches are related to the RFIT technology used in the stadium. Therefore, this research uses technology acceptance model as the core and integate technology readiness(optimism, innovation, unaccommodated and unsafe)and innova
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Todd, Michael Gordon. "Hardware Emulation of a Secure Passive Rfid Sensor System." 2010. https://scholarworks.umass.edu/theses/528.

Повний текст джерела
Анотація:
Passively powered radio frequency (RFID) tags are a class of devices powered via harvested ultra high frequency (UHF) radiation emitted by a reader device. Currently, these devices are relegated to little more than a form of wireless barcode, but could be used in a myriad of applications from simple product identification to more complex applications such as environmental sensing. Because these devices are intended for large scale deployment and due to the limited power that can be harvested from RF energy, hardware and cost constraints are extremely tight. The Electronic Product Code (EPC) Gl
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Chen, Shu-Yu, and 陳姝妤. "Investigating teaching staff’s Acceptance Behavior on RFID Based Campus Security System by UTAUT and TTF model." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/5jdugz.

Повний текст джерела
Анотація:
碩士<br>國立臺北科技大學<br>工業工程與管理研究所<br>99<br>Campus security system, provides the ability to monitor, security and asset management etc, it can help teaching staff improve their work performance, and the process of implementation of campus security plan is required by the school staff, teaching staff and implementation team completed together, so it is importance which teaching staff’s acceptance behavior on RFID based Campus security system. This study explores the factors that affect teaching staff to accept campus security system by using UTAUT and TTF model. The participant size was 200, and tes
Стилі APA, Harvard, Vancouver, ISO та ін.
45

林忠良. "applying RFID on barrack security system under the prohibiting of infinite internet:some air force base for instance." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/41271204617661789462.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

CHIOU, SHIAU-YU, and 邱蕭宇. "The Study of Security system for precious gift shop based on RFID – An example of jewelry stores." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/42037005858630193621.

Повний текст джерела
Анотація:
碩士<br>育達商業技術學院<br>資訊管理所<br>97<br>Nowadays in precious gift shops or other businesses such as jewelry stores, stolen cases happen all the time. Therefore, this research tried to design a security system for precious gifts by using RFID technology to enhance the quality of valuable security. This idea tried to equip RFID readers and tags at the display cabinets to detect stolen case real-time. While unauthorized removal of gifts from the display cabinet, the system will activate the anti-theft warning system and send warning messages to managers. This research enhances security of precious gift
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Kuo-Kun, Hong, and 洪國焜. "School Assets Security and Tracking Management By Implementing a RFID System : A Case Study Of Local Primary School." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/67722533774113276725.

Повний текст джерела
Анотація:
碩士<br>亞洲大學<br>資訊工程學系碩士在職專班<br>99<br>Because of modern technology boom, the Scholl teaching aids relatively increase , and types of school property are so plentiful, which increasingly demand the school management for the property. Because teaching frequently needs to borrow equipment, it will make inventory of assets more arduous. The purpose of the school assets management is able to provide these existing assets with tracking, inventory, and configuration. The manual management of assets in the past to manage is not efficient so that the assets management and inventory also has been
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Hsiao, Chun-Hung, and 蕭俊宏. "Based on Multiple Security Module Integrate RFID Reader of a machine to read multiple cards Wireless RF System Development." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/16191578007504762391.

Повний текст джерела
Анотація:
碩士<br>樹德科技大學<br>資訊工程系碩士班<br>100<br>The rapid transit system has been completed in Taipei metropolitan area and Kaohsiung metropolitan area, highway toll system has also been using the electronic toll collection mode and EasyCard small consumer, the growing popularity of smart card applications. Taiwan currently has four major ticket card issuing company (EasyCard, I-Pass, Tai-Chi card, Electronic Toll Collection card), four of the company&apos;&apos;s smart cards are the MIFARE system architecture. But the definition of the MIFARE card field content of the different companies with different s
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Yu-Ping, Chen, and 陳玉屏. "Implementing a campus security management system by using RFID : a case study of special education class of a local elementary school." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/98686374692445496205.

Повний текст джерела
Анотація:
碩士<br>亞洲大學<br>資訊工程學系碩士班<br>99<br>All schools are obligated to build a healthy, pleasant, secure, and warm campus, and to provide an excellent learning environment and content so that students can learn and grow happily. In addition to special education students requiring more assistance and care in learning than normal students, it is essential to maintain the safe activities in campus for special education students. Therefore, security maintenance on campus for special education students has been valued by schools. With RFID technology, it is easier to locate and track the movement of studen
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Wang, Chun Kai, and 王俊凱. "A Case on Implementing a RFID System to Improve the Sentry Security Process of the Military Base and the Acceptability of the Sentry-From the Perspective of a Military Airbase." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/nshnyc.

Повний текст джерела
Анотація:
碩士<br>國立臺南大學<br>經營與管理學系科技管理碩士在職專班<br>104<br>In this paper we studied the domestic and foreign literature, used a military base sentry security process as a reference, and demonstrated a business process reengineering model using RFID system instead of paper when performing sentry security tasks that enhance military sentry security process effectiveness. This study integrated UTAUT, TTF and IS Success Model to develop its research model. A survey was conducted. The questionnaires were handed out from October 2015 to December 2015. A total of 351 effective questionnaires have been collected. SP
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!