rfid-radio frequency identification research papers





A Multi-Agent-based RFID Framework for Smart-object Applications
free download

ABSTRACT Coupled with software agent technology, RFID can transform everyday objects into smart objects. Currently, in most applications, agent definitions are not encoded directly on the tags due to tag memory limitations, and RFID technology is used purely for

Monitoring dressing activity failures through RFID and video
free download

Summary Background: Monitoring and evaluation of Activities of Daily Living in general, and dressing activity in particular, is an important indicator in the evaluation of the overall cognitive state of patients. In addition, the effectiveness

RFID-enabled healthcare applications, issues and benefits: An archival analysis (1997–2011)
free download

Abstract In this paper, a comprehensive review of articles published between 1997 and 2011 in the Journal of Medical Systems (JMS) on RFID technology is presented. A total of 22 papers are analyzed using a classification framework that has three dimensions: RFID-

Comparison of RFID Tag Technologies
free download

Page 1. Comparison of RFID Tag Technologies EE-260: RFID Systems Spring 2012 Sam Mandev Joshua Perez Alex Yun Professor Robert Morelos  Conclusion 2 Page 3. Applications of UHF RFID • Asset Tracking • Personnel Tracking • Data Acquisition • Payment Systems

Planning and managing disruptive business models for RFID-startups-The disruptor s arrow of time
free download

ABSTRACT This paper presents a one-page visual tool for adaptively planning and managing potentially disruptive business models such as in RFID-Startups. The visual tool is called The Disruptor s Arrow of Time. The modular and iterative approach of the Disruptor s

Human condition monitoring in hazardous locations using pervasive RFID sensor tags and energy-efficient wireless networks
free download

ABSTRACT Tracking persons in dangerous situations as well as monitoring their physical condition, is often crucial for their safety. The systems commonly used for this purpose do not include individual monitoring or are too expensive and intrusive to be deployed in

Location Proof via Passive RFID Tags
free download

With the surge in location-aware applications and prevalence of RFID tags comes a demand for providing location proof service with minimal cost. We introduce two protocols that provide secure and accurate location proof service using passive RFID tags. Both

Two Ultralightweight Authentication Protocols for Low-Cost RFID Tags
free download

ABSTRACT The Radio Frequency Identification (RFID) system plays an important role in authentication, security control, supply chain management, and inventory control. Due to market consideration, low-cost RFID systems have become very popular in recent years.

A New Designated Query Protocol for Serverless Mobile RFID Systems with Reader and Tag Privacy
free download

ABSTRACT Recently, a new type of RFID system with mobile readers is introduced. In such a system, it is more desirable for mobile readers to identify tags without a back-end server, and thus it is frequently referred as a serverless mobile RFID system. In this paper, we

The Effects of RFID and EDI Technologies on Supply Chain Dynamics
free download

Abstract Process automation and information sharing are becoming increasingly important to the successful operation of supply chains. While previous works have investigated the effects of radio frequency identification (RFID), electronic data interchange (EDI), and

Leveraging Read Rates of Passive RFID Tags for Real-Time Indoor Location Tracking
free download

ABSTRACT RFID (radio frequency identification) technology has been widely used for object tracking in many real-life applications, such as inventory monitoring and product flow tracking. These applications usually rely on passive RFID technologies rather than active

A novel method of robot location using RFID and stereo vision
free download

ABSTRACT This paper proposed a new global localization method for mobile robot based on RFID (Radio Frequency Identification Devices) and stereo vision, which makes the robot obtain global coordinates with good accuracy when quickly adapting to unfamiliar and

A Reprocessing Model for Complete Execution of RFID Access Operations on Tag Memory
free download

ABSTRACT This paper investigates the problem of inconsistent states of radio frequency identification (RFID) tag data caused by incomplete execution of read/write operations during access to RFID tag memory. Passive RFID tags require RF communication to

EMAP: An efficient mutual authentication protocol for passive RFID tags
free download

ABSTRACT Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that, in order to identify only one single

Secure recharge of disposable RFID tickets
free download

We study the Mifare Ultralight cards in detail, and we present a new secure method for the recharge of these RFID disposable tickets that also extends to the case of multiple resources on a single device. We specify a formal but yet realistic semantics of these cards, and we

Desynchronization Attack on Hash-based RFID Mutual Authentication Protocol
free download

ABSTRACT A radio frequency identification (RFID) system is a promising automatic identification technology that uses communication via radio waves to identify and track moving objects. Privacy and security concerns inhibit the fast adaption of RFID technology

Secure architecure for the integration of RFID and sensors in personal networks
free download

The secure integration of RFID technology into the personal network paradigm, as a context- aware technology which complements body sensor networks, would provide notable benefits to applications and potential services of the personal network (PN). RFID security

AN RFID BASED DEVICE FOR INNOVATING THE PATIENTS MANAGEMENT
free download

ABSTRACT The advent of computer systems in support of medical procedures has significantly improved healthcare services quality, and the patients general quality of life. Nevertheless, these benefits not always improve patient s health directly. For example, in the case of an

MANAGERIAL GUIDANCE FOR APPLYING RFID IN THE TOURISM INDUSTRY
free download

Abstract Companies in the tourism industry can use radio frequency identification (RFID) for a wide range of applications to enhance their operations and marketing and help provide new and improved services for guests. Motivated by examples of RFID use by hotels,

An automatic, time-based, secure pairing protocol for passive RFID
free download

This paper introduces the Adopted-Pet (AP) protocol, an automatic (ie requiring no human interaction) secure pairing protocol, adequate for the pairing between a passive RFID tag and a reader. Most pairing protocols rely for their security on a certain advantage that the

Signal Processing in RFID
free download

Page 1. Signal Processing in RFID Markus Rupp, Jelena Kaitovic, Robert Langwieser Institute Introduction • RFID – Radio Frequency Identification • Wireless identification technology

Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains
free download

In this paper, we propose a distributed path authentication solution for dynamic RFID- enabled supply chains to address the counterfeiting problem. Compared to existing general anti-counterfeiting solutions, our solution requires non sharing of item-level RFID

Maximum A Posteriori (MAP)-based Tag Estimation Method for Dynamic Framed-Slotted ALOHA (DFSA) in RFID Systems
free download

ABSTRACT Radio frequency identification (RFID) is a non-contact technology that uses radio frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. One of the common problems that arise

An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques
free download

ABSTRACT Nowadays, the vital parts of the business programs are the data warehouses and the data mining techniques. Especially these are vital in the Radio Frequency Identification (RFID) application which brings a revolution in business programs. Manufacturing, the

On the security of mutual authentication protocols for rfid systems: the case of wei et al. s protocol
free download

Authentication is one of the most basic and important cryptographic tasks. Mutual authentication protocols play a crucial role on the security of RFID systems. In this paper, we consider the security of a recently proposed mutual authentication protocol by Wei et al.

Target tracking and surveillance by fusing stereo and RFID information
free download

ABSTRACT Ensuring security in high risk areas such as an airport is an important but complex problem. Effectively tracking personnel, containers, and machines is a crucial task. Moreover, security and safety require understanding the interaction of persons and

ROTIV: RFID ownership transfer with issuer verification
free download

RFID tags travel between partner sites in a supply chain. For privacy reasons, each partner owns the tags present at his site, ie, the owner is the only entity able to authenticate his tags. When passing tags on to the next partner in the supply chain, ownership of the old partner

request paper rfid noise



Determining a better metric for RFID performance in environments with varying noise levels
free download

Abstract:Often users wish to maximize the range of a passive RFID system. At the furthest extent of their range the signal between tag and reader will be at the weakest level which the reader can detect. It is desirable to know how close a system is to operating at this level,
rfid-radio frequency identification research papers 2012

rfid-radio frequency identification research papers 2012-103

CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER