Results 21 to 30 of about 43,693 (225)

Empowering and conquering infirmity of visually impaired using AI‐technology equipped with object detection and real‐time voice feedback system in healthcare application

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract The Internet of Things is emerging as a crucial technology in aiding humans and making their lives easier. Among the human population, a large percentage of people suffer from disabilities resulting in challenges in everyday life particularly people with visual disabilities.
Hania Tarik   +8 more
wiley   +1 more source

Recent Advances and Applications of Passive Harmonic RFID Systems: A Review

open access: yesMicromachines, 2021
Harmonic Radio Frequency Identification (RFID) systems have attracted significant interest over the last decade as it provides many benefits over the conventional RFID systems.
Saikat Mondal   +2 more
doaj   +1 more source

A Cloud-based RFID Authentication Protocol with Insecure Communication Channels [PDF]

open access: yes, 2016
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Alshehri, Awatif   +2 more
core   +2 more sources

AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]

open access: yes, 2017
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Ahamed, Sheikh Iqbal   +2 more
core   +3 more sources

Context-Aware Perspective Analysis Working Of RFID Anti-Collision Protocols

open access: yesJISR on Computing, 2018
RFID (Radio Frequency Identification) is the fastest growing technology, as many IoT devices are communicating via RFID technology. During the interaction among RFID reader and tag, collision happens in different ways like tag-to-tag, reader-to-reader ...
Muhammad Ayoub Kamal   +2 more
doaj   +1 more source

Clone tag detection in distributed RFID systems. [PDF]

open access: yesPLoS ONE, 2018
Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology.
Hazalila Kamaludin   +2 more
doaj   +1 more source

Multi-State Logging Freeze Detection Passive RFID Tags [PDF]

open access: yes, 2014
In this work the design and measurement of a passive UHF RFID smart tag suitable for monitoring and recording critical temperature violations in cold chain management are presented.
Batchelor, John C., Ziai, M. Ali
core   +1 more source

A multi band mini printed omni directional antenna with v-shaped for RFID applications [PDF]

open access: yes, 2011
This paper presents a mini multi-band printed omni-directional antenna with v-shaped structure for radio frequency identification (RFID) applications. The proposed multi-band antenna is developed from the initial v-shaped design which is only capable of ...
Abd. Rahman, Tharek   +3 more
core   +1 more source

Design and Development of Login Security System Using Radio Frequency Identification

open access: yesLogic, 2019
System security is important in information systems to prevent unauthorized users from accessing data. Login system applies security using encrypted passwords stored on RFID cards.
I Gede Sujana Eka Putra   +1 more
doaj   +1 more source

Vertical coordination in agri‐food supply chain and blockchain: A proposed framework solution for Vietnamese cashew nut business

open access: yesRegional Science Policy &Practice, EarlyView., 2022
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley   +1 more source

Home - About - Disclaimer - Privacy