The Key Technology for the Implementation of Direct-Production of Radio-Frequency Based on SDR Platform

Article Preview

Abstract:

RFID (Radio Frequency Identification) has been playing an important role in the construction and development of Internet of things, for its status as the base and heart of Internet of things, and it also contains a huge market. But at present the judgment criteria and core products in the field of RFID are all tied down by other countries, those companies in our country who need to use RFID not only have to pay for an immense amount of patent royalties, but also have to be ready for the Information security risks at any time. In order to achieve the independent innovation of RFID and meet the RFID system developing demand in our country, there are some needs to do something to solve the problems related to key technology in RFID system, then to win ourselves the proprietary intellectual property rights and the standards system for radio frequency identification of our own.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1079-1080)

Pages:

824-827

Citation:

Online since:

December 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Xiao-jun Jin . Renewable Pseudo Code Ranging Technology and Implementation Research [D]. Hangzhou: zhejiang University, 2007, 1-85.

Google Scholar

[2] Xiao-liang Li, liu Min. Deep Space Regeneration Pseudo Code Ranging Application Research [C]. Telemetry and Telecontrol Technology the 15th National Conference Papers, Hangzhou states, November 1, 2008, 345-352.

Google Scholar

[3] Xing Shan. Satellite Side Tone Ranging Technology Research and Implementation [D]. Xi an: xi , an University of Electronic Science and Technology, 2011, 13 to 55.

Google Scholar

[4] Yan-jun Wang. A Nonlinear Estimation Algorithm for Pseudo Code Ranging in Frequency Domain [J]. Journal of Radio Engineering, 2007, 37 (2) : 38 and 39.

Google Scholar