Results 21 to 30 of about 45,748 (240)

Design of a UAV for Autonomous RFID-Based Dynamic Inventories Using Stigmergy for Mapless Indoor Environments

open access: yesDrones, 2022
Unmanned aerial vehicles (UAVs) and radio frequency identification (RFID) technology are becoming very popular in the era of Industry 4.0, especially for retail, logistics, and warehouse management.
Abdussalam A. Alajami   +2 more
doaj   +1 more source

Novel binary search algorithm for fast tag detection in robust and secure RFID systems [PDF]

open access: yes, 2012
Novel binary search algorithm for fast tag detection (BSF1) and (BSF2) in robust and secure RFID systems is presented in this paper. These algorithms introduce fast tag detection with the new method of inquiry.
Mohd. Daud, Salwani, Yaacob, Marizan
core   +1 more source

Using dummy data for RFID tag and reader authentication

open access: yesDigital Communications and Networks, 2022
Radio-Frequency IDentification (RFID) technology is an essential enabler of a multitude of intelligent applications. The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags.
Baha’ A. Alsaify   +3 more
doaj   +1 more source

From the Internet of things to the Internet of physical world [PDF]

open access: yes, 2011
International audienceThis article describes the different kinds of RFID tags.
Mitton, Nathalie, Simplot-Ryl, David
core   +4 more sources

Tag-to-Tag Interference Suppression Technique Based on Time Division for RFID

open access: yesSensors, 2017
Radio-frequency identification (RFID) is a tracking technology that enables immediate automatic object identification and rapid data sharing for a wide variety of modern applications using radio waves for data transmission from a tag to a reader. RFID is
Grishma Khadka, Suk-Seung Hwang
doaj   +1 more source

Keep on Blockin’ in the Free World [PDF]

open access: yes, 2007
I am here today to talk about some of the security implications of Radio Frequency Identification. RFID tags are remotely-powered data carriers that resemble the theft control tags that you might find in a sweater when buying clothing from a store ...
Rieback, Melanie
core   +3 more sources

A Collecting Collision Tree Protocol for RFID Tag Identification with Capture Effect

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Multitag identification is one of the main advantages of the radio frequency identification (RFID) system. In the RFID system, the capture effect often happens in the real environment.
Yang Qing, Li Jiancheng, Wang Hongyi
doaj   +1 more source

Reliable UHF Long-Range Textile-Integrated RFID Tag Based on a Compact Flexible Antenna Filament

open access: yesSensors, 2020
This paper details the design, fabrication and testing of flexible textile-concealed Radio Frequency Identification (RFID) tags for wearable applications in a smart city/smart building environment.
Mahmoud Wagih   +4 more
doaj   +1 more source

Vertical coordination in agri‐food supply chain and blockchain: A proposed framework solution for Vietnamese cashew nut business

open access: yesRegional Science Policy &Practice, EarlyView., 2022
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley   +1 more source

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems

open access: yesInternational Journal of Distributed Sensor Networks, 2012
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking the private information of tags.
Li Lu, Jinsong Han, Lei Hu, Lionel M. Ni
doaj   +1 more source

Home - About - Disclaimer - Privacy