Papers by Keyword: Radio Frequency Identification (RFID)

Paper TitlePage

Authors: Lu Li, Kai Jun W
Abstract: A book positioning system is designed based on WI-FI and RFID technology, and the regional search program is proposed. Readers or administrators can locate the desired books by the terminal equipments such as mobile phones, ipad and so on. The system displays the positioning information in the form of picture on the terminal equipment, so that user can find the book quickly. It improves the efficiency of the call, and completely solves the problem that if one book is misplaced, hundreds of people cannot find it.
Authors: Pu Liu
Abstract: With the rapid development and extensive application of network technology, the concept of IOT (Internet of Things) is coming into view. Through information sensing device, according to the agreed protocol, IOT can connect anything to the Internet and to achieve the exchange of information and intelligence management. This paper elaborates the core technologies of the IOT, describes the application of IOT, analyzes the three major issues of IOT development constraints, and makes a few comments to promote the development of IOT.
Authors: Zhi Rong Chen, Tian He Yin, Xing Jia Lu, Fan Yang
Abstract: Combining RFID and LBS technology, this paper discusses a survey conducted for developing a Car Locator system which can provide help to users to quickly find their vehicles in a large parking lot, and the system architecture and a prototype is developed from the survey results.
Authors: Yan Qiu, Quan Yin Zhu
Abstract: In order to improve the communication between teachers and students and make the high-level course’s form intelligent, ThinkPHP, HTTP, SMTP, OpenCV, POP3 and SMTP were integrated to enhance high-level course performance. Micro-channel and Micro logging were used for the communication of the students and teachers. Furthermore, RFID device and camera were used as tools of checking on attendance and examination. The proposed system achieves the multiple technology integrated application which can also improving intelligence and the manage efficiency for high-level course.
Authors: Yan Qiu, Lei Zhou, Quan Yin Zhu
Abstract: in order to improve the level of quality course, new information technology is applied to upgrade construction mode of the traditional one. It is an inevitable trend of the rapid development of intelligent technology. Hybrid architecture of B/S and C/S is adopted in the proposed system design. In addition, the ThinkPHP framework based on PHP and database in MySQL are put to construct the high-level course Website. The automatic class attendance is achieved by serial communication programming on C#. The new technology of identification on RFID and face detection on EmguCV is introduced into it. All of those are aimed to enrich the course resources management and quality course tracking in the future. Through three month commissioning, it shows that the application system reaches the anticipative design goal.
Authors: Miao Zhou
Abstract: Payment cards supporting contactless transactions are becoming increasingly popular in recent years. While enjoying the benefits in terms of speed and convenience provided by the new feature, considerable concerns over security and privacy of RFID technology used for contactless payment have been raised for some time. Actually, diverse attacks against fielded systems have already been found and demonstrated. Among the various existing countermeasures, cryptographic solutions are more commonly used as a mechanism for providing security and privacy protections. The goal of this paper is to take a deep insight into one of the RFID-enabled payment devices, known as Digital Signature Transponder (DST). Especially, the explanation of its cryptographic design is presented in detail.
Authors: Wei Cao, Ping Yu Jiang
Abstract: When the idea of service has redefined the way that a warehouse is operated and facilitated the emergence of public warehouse as a new logistic mode, in recent years, the maturity of RFID technology and its applications have brought deeply impact to the warehouse once again. In this paper, a conceptual framework about how to use RFID in the public warehouse is proposed. The main functions of the framework, working flow of a public warehouse and its management style of are illustrated. At last, some key enabling technologies are described in detail, that is, RFID tag and reader configuration, task pool model and task implementation mathod.
Authors: Yan Zhong Yu, Ji Zhen Ni, Xian Hui Li
Abstract: A printed inverted-F antenna for RFID tag at 5.8 GHz is designed in this paper. The antenna structure consists of an inverted-F patch, a substrate layer, and a ground plane. To reduce costs, the FR4 is selected as the material of substrate layer, which is used commonly in PCB (Printed Circuit Board). Its relative permittivity is 4.4 and a loss tangent is 0.02. The inverted-F patch and ground plane are laid on/under the substrate layer respectively. The designed antenna is modeled, simulated and optimized by using HFSS (high frequency electromagnetic simulation software). Simulation results demonstrate that the printed inverted-F antenna can satisfy the requirements of RFID Tag applications.
Authors: Cong Ya Yang, Chun Yu Bai
Abstract: This paper presents a ML2012 system of the downhole safety management system based on RFID technology downhole safety jobs. The development and production of the set of underground personnel positioning, attendance, hardware maintenance, and day-to-day management is one comprehensive application systems. Monitoring and positioning of the coal mine personnel, vehicles and disaster relief to help. It has an extremely important significance to improve mine management level to ensure the safe production of enterprise automation.
Authors: Hui Song
Abstract: A novel tag estimation algorithm named DFSA-MD1 is proposed, and applied to the field of tag identification that aims at decreasing tag collision number in RFID systems. The proposed algorithm regarded the tag identification process of a frame of the dynamic frame slotted ALOHA algorithm (DFSA) as an M/D/1 queuing system. The reader can estimate tag number of next frame from success slots number and collision slot number in current frame and current frame size according to M/D/1 queuing model.The experimental results show that DFSA-MD1 algorithm requires less time consumption and lower complexity for tag identificaiton and achieves the best performance of the DFSA tags identification protocols.
Showing 1 to 10 of 355 Paper Titles