The Design and Implementation of Remote Intelligent Conference Attendance System Based on RFID

Article Preview

Abstract:

The article draws lessons from radio frequency identification RFID identification results at home and abroad, put forward the general framework of RFID conference attendance system, to realize the higher requirements of the real-time conferencing electronic data storage, query, statistics and other functions, to realize the conference management be intelligent, barrier-free remote control.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1017-1021

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Jihoon Myung, Wonjun Lee and Srivastava J., Adaptive binary splitting for efficient RFID tag anti-collision[J]. IEEE communication letters,v01.10,pp.144-146.

DOI: 10.1109/lcomm.2006.1603365

Google Scholar

[2] Taseung Kim, Howon Kim. Access Control for Middleware in RFID Systems. Technical report, 2006, (2):1020-1022.

Google Scholar

[3] David J. Puleson, Ian J. Forster. A Framework for consistent evaluation of RFID Tags from design and manufacture o end use.Technical report, 2005. (10).

Google Scholar

[4] WANG Cheng, SHI Tianyun, JIANG Qiuhua, et al. RFID Application in China Railway Passenger Transport System[J]. Railway Computer Application, 2008(5).

Google Scholar

[5] ZHAO Yongjun, ZHAO Lihui, LI Zhong, et al. Implementation on Research of Middleware Technology Based on RFID.

Google Scholar

[6] GU Y, YU G, HU X, et al. Efficient RFID data cleaning model based on dynamic clusters of monitored objects[J]. Journal of Software, 2010, 21(4): 632-643.

DOI: 10.3724/sp.j.1001.2010.03565

Google Scholar

[7] TRAN T, SUTTON C, COCCI R, et al. Probabilistic inference over RFID streams in mobile environments[C]. Proceedings of the 25th International Conference on Data Engineering. Piscataway, NJ, USA: IEEE, 2009: 1096-1107.

DOI: 10.1109/icde.2009.33

Google Scholar

[8] RAO J, DORAISWAMY S, THAKKAR H, et al. A deferred cleansing method for RFID data analytics[C]. Proceedings of the 32nd International Conference on Very large Data Bases. Almaden, CA, USA: VLDB Endowment Inc., 2006: 175-186.

Google Scholar

[9] Md. Morshed, Anthony Atkins, Hong-Nian Yu et al . An efficient and secure authentication protocol for RFID systems[J]. International Journal of Automation and Computing, 2012, Vol. 9(3).

DOI: 10.1007/s11633-012-0642-4

Google Scholar

[10] Ding WANG. Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards[J]. The Journal of China Universities of Posts and Telecommunications, 2012, 19(5).

DOI: 10.1016/s1005-8885(11)60307-5

Google Scholar