Academic literature on the topic 'Embedded RFID'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Embedded RFID.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Embedded RFID"

1

Mary M, Anitha, Bharathy R, Jhanani Shree U, and Richard Jebasingh S. "Database Management using Embedded System and CAD." International Journal of Engineering & Technology 7, no. 3.1 (August 4, 2018): 191. http://dx.doi.org/10.14419/ijet.v7i3.1.17339.

Full text
Abstract:
An aim of this paper is to use Radio Frequency Identification (RFID) technology in facilitating efficient file management system. RFID is an abbreviation of radio frequency identification, RFID was poised to take off and become a standard piece of library technology. An RFID transmitter is also needed to capture the radio frequency signal from the tag for turn out to be giving out by the RFID reader. Therefore RFID has been referred to as “a non-contact method of using radio frequency electromagnetic waves for communication between two remote entities”. An Objective of this paper is to design 3D modeling of file rack using Creo software, manage the files using RFID tag, read the files from RFID using microcontroller through embedded code and to display the files using 16x2 Liquid Crystal Display and 4x4 keypad. The position of the files in the rack will be identified using Light Emitting Diode.
APA, Harvard, Vancouver, ISO, and other styles
2

Hao, Hong Qi, and Hong Tao Guo. "The Development of RFID Data Management System Based on Embedded System." Advanced Materials Research 718-720 (July 2013): 2080–85. http://dx.doi.org/10.4028/www.scientific.net/amr.718-720.2080.

Full text
Abstract:
Embedded system in general is formed by the embedded computer system and implementing device. Embedded system is a control program stored in ROM embedded processor control board. The basic function of Radio Frequency Identification (RFID) is to realize the precise data acquisition. RFID reader via the antenna and the RFID tag for wireless communication can be achieved on the label identification code and a memory data read or write operation. The paper presents the development of RFID data management system based on embedded system. Experimental results show that the proposed algorithm has high efficiency.
APA, Harvard, Vancouver, ISO, and other styles
3

Hu, Shengbo, Bing Si, Heng Shu, and Jinrong Mo. "Power Transmission of UHF Passive Embedded RFID in Tires." International Journal of Antennas and Propagation 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/897041.

Full text
Abstract:
UHF passive RFID tags embedded in tires have a deep impact on tire life cycle management and tire monitoring. In this work, we present the power transmission of UHF passive embedded RFID in tires. In UHF passive embedded RFID systems in tires, the bidirectional radio link between reader and tags goes through air and tires. The total path loss contains reflection loss at tire-air boundaries and attenuation loss in the tires. The power transmission is based on the permittivity of tires and tire-air boundary conditions. We give an OCP method for measuring the permittivity of tires. By analyzing the radio link for UHF passive RFID, we establish a model of wave propagation of UHF embedded RFID in tires and make numerical analyses. Numerical analyses show that the error of the OCP methods for measuring the permittivity of tires is small, the parallel polarization and normal incidence of wave are chosen for improving the performance of the UHF embedded RFID in tires, and distance is chosen to keep power transmission function from locating valley.
APA, Harvard, Vancouver, ISO, and other styles
4

Allan, K. "Tickety-boom [RFID embedded tickets]." Engineering & Technology 3, no. 14 (August 9, 2008): 64–65. http://dx.doi.org/10.1049/et:20081415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blischak, Andrew T., and Majid Manteghi. "Embedded Singularity Chipless RFID Tags." IEEE Transactions on Antennas and Propagation 59, no. 11 (November 2011): 3961–68. http://dx.doi.org/10.1109/tap.2011.2164191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

González-López, Giselle, Jordi Romeu, Ignasi Cairó, Ignacio Segura, Tai Ikumi, and Lluis Jofre-Roca. "Wireless Sensing of Concrete Setting Process." Sensors 20, no. 20 (October 21, 2020): 5965. http://dx.doi.org/10.3390/s20205965.

Full text
Abstract:
An RFID-based wireless system to measure the evolution of the setting process of cement-based materials is presented in this paper. The system consists of a wireless RFID temperature sensor that works embedded in concrete, and an external RFID reader that communicates with the embedded sensor to extract the temperature measurement conducted by the embedded sensor. Temperature time evolution is a well known proxy to monitor the setting process of concrete. The RFID sensor consisting of an UWB Bow Tie antenna with central frequency 868 MHz, matched to the EM4325 temperature chip through a T-match structure for embedded operation inside concrete is fully characterized. Results for measurements of the full set up conducted in a real-scenario are provided.
APA, Harvard, Vancouver, ISO, and other styles
7

Karthikeyan, K., and Gaurav Bajpai. "Two Layered Embedded Encryption for Multiple Frequency RFID Tags." Advanced Materials Research 367 (October 2011): 83–87. http://dx.doi.org/10.4028/www.scientific.net/amr.367.83.

Full text
Abstract:
Radio Frequency Identification (RFID) is an automatic identification system. The data storage and retrieval on special devices are carried by RFID tags or transponders. RFID tag applications include enterprise supply chain management to improve the efficiency of inventory tracking and management. These replace bar codes and other low cost remote sensors earlier in use.
APA, Harvard, Vancouver, ISO, and other styles
8

Botero, Oscar, and Hakima Chaouchi. "RFID service for non-RFID enabled devices: Embedded hardware implementation." Procedia Computer Science 5 (2011): 74–81. http://dx.doi.org/10.1016/j.procs.2011.07.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mehul P. Barot, Ramesh T. Prajapati, Darshan P. Patel, Hitesh H. Wandra,. "Embedded Systems Based Intelligent Bank Locker Security System." Tuijin Jishu/Journal of Propulsion Technology 44, no. 5 (November 29, 2023): 1770–76. http://dx.doi.org/10.52783/tjjpt.v44.i5.2854.

Full text
Abstract:
Nowadays, security plays a big role, notably in homes, companies, and banks. This article uses embedded systems to design a bank locker security system. The Global System for Mobile (GSM) and Radio Frequency Identification (RFID) technologies are the foundation of this system. Only honest people are permitted to retrieve money or gold from bank lockers. It is created by fusing RFID and GSM technologies, allowing for real-time activation, authentication, and validation of the user and door unlocking for safe access to bank lockers. GSM and passive RFID are safer than other technologies. A microcontroller, RFID reader, GSM modem, keyboard, and a liquid crystal diode make up this system (LCD). This system employs a dual password protection scheme to ensure that only legitimate individuals can get funds from bank lockers.
APA, Harvard, Vancouver, ISO, and other styles
10

Hayles, N. Katherine. "RFID: Human Agency and Meaning in Information-Intensive Environments." Theory, Culture & Society 26, no. 2-3 (March 2009): 47–72. http://dx.doi.org/10.1177/0263276409103107.

Full text
Abstract:
RFID tags, small microchips no bigger than grains of rice, are currently being embedded in product labels, clothing, credit cards, and the environment, among other sites. Activated by the appropriate receiver, they transmit information ranging from product information such as manufacturing date, delivery route, and location where the item was purchased to (in the case of credit cards) the name, address, and credit history of the person holding the card. Active RFIDs have the capacity to transmit data without having to be activated by a receiver; they can be linked with embedded sensors to allow continuous monitoring of environmental conditions, applications that interest both environmental groups and the US military. The amount of information accessible through and generated by RFIDs is so huge that it may well overwhelm all existing data sources and become, from the viewpoint of human time limitations, essentially infinite. What to make of these technologies will be interrogated through two contemporary fictions, David Mitchell's Cloud Atlas and Philip K. Dick's Ubik . Cloud Atlas focuses on epistemological questions — who knows what about whom, in a futuristic society where all citizens wear embedded RFID tags and are subject to constant surveillance. Resistance takes the form not so much of evasion (tactical moves in a complex political Situation) but rather as a struggle to transmit information to present and future stakeholders in a world on the brink of catastrophe. Ubik, by contrast, focuses on deeper ontological questions about the nature of reality itself. Both texts point to the necessity to reconceptualize information as ethical action embedded in contexts and not merely as a quantitative measure of probabilities.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Embedded RFID"

1

Blischak, Andrew Travis. "Analysis of an Embedded Singularity Chipless RFID Tag." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/43715.

Full text
Abstract:
The objective of this research is to explore the feasibility of a chipless RFID tag that stores a data signature in the form of complex frequency plane singularities. To this end an existing chipless RFID tag, the notched elliptical dipole tag, was analyzed first with simulations and then measurements. A pole signature was extracted from simulations, and individual poles were determined via experimentation to be attributable to specific controllable features of the tag. The poles were shown to be independent of both excitation and observation. A prototype tag was measured, and the pole signature was retrieved from the scattered fields. The tag was successfully read for different orientations showing that embedded singularities can be used as a means for encoding and retrieving data.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
2

Aksoy, Onder. "Telemedicine patient identification with RFID : an embedded approach /." Online version of thesis, 2009. http://hdl.handle.net/1850/10747.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tirosh, Daniél. "Design utav kompakt multifrekvent RFID-system." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-42474.

Full text
Abstract:
Radio Frequency Identification, RFID, is a wireless identification method which uses electromagnetic fields in order to communicate with electronic tags in the vicinity. In recent years, in conjunction with the digitalization of society, RFID has become a popular method for digital identification. RFID, as a method for digital identification, is often used for credit card payments in store, access control to locked rooms and renting books at libraries. As a result of RFID growing rapidly, different frequencies have emerged. In order to benefit from different frequencies, a multi frequency RFID-reader was designed. The purpose of this study was to examine which difficulties arise in the development of a small multi frequency RFID-reader. This study shows that a small multi frequency RFID-reader lacks the conditions that are required to reach the read distance specified in available research. Furthermore, the study shows it is difficult to read different tags simultaneously without the use of a RTOS or a multicore processor.
APA, Harvard, Vancouver, ISO, and other styles
4

Copello, Claudio Gustavo. "Enhancing Data Security and Energy Efficiency on Battery-Free Programmable Platform via Adaptive Scheduling." OpenSIUC, 2016. https://opensiuc.lib.siu.edu/theses/2038.

Full text
Abstract:
Embedded devices constantly face two challenges in data security and energy efficiency. These devices are limited in processing such secure functions, as well as maintaining enough energy for the device to function properly. One example involves the healthcare industry, where some patients may require an Implantable Cardioverter Defibrillator (ICD) in their hearts to measure the heartbeat rate, while powered by a battery. The heartbeat rate is sent wirelessly, and the ICD can receive a jolt of electricity when the heartbeat rate reaches an abnormal value. Transmitting data alone, however, yields potential security risks when sending plain data. Work has shown that an attacker could intercept the heartbeat rate of the ICD, and intentionally send jolts of electricity. Also, replacing the battery on an ICD involves quite a painful process for the patient. A battery-less device that can receive energy wirelessly is much more convenient, but also poses a challenge where power loss may occur under long distances due to a limited supply of energy. In this paper, we design an adaptive light-weight scheduling mechanism that enhances data security, as well as improving energy efficiency on a device with such constraints. We will then prototype this scheduler on a Wireless Identification and Sensing Platform (WISP) device, which includes these constraints. Our results will then demonstrate the capabilities of such adaptive scheduling under various distances.
APA, Harvard, Vancouver, ISO, and other styles
5

Fotopoulou, Kyriaki. "Inductive wireless power transfer for RFID & embedded devices : coil misalignment analysis and design." Thesis, University of Edinburgh, 2008. http://hdl.handle.net/1842/10907.

Full text
Abstract:
Radio frequency inductive coupling is extensively employed for wireless powering of embedded devices such as low power passive near-field RFID systems and implanted sensors. The efficiency of low power inductive links is typically less than 1%and is characterised by very unfavourable coupling conditions, which can vary significantly due to coil position and geometry. Although, a considerable volume of knowledge is available on this topic, most of the existing research is focused on the circuital modeling of the transformer action between the external and implanted coils. The practical issues of coil misalignment and orientation and their implications on transmission characteristics of RF links have been overlooked by researchers. The aim of this work is to present a novel analytical model for near-field inductive power transfer incorporating misalignment of the RF coil system. In this thesis the influence of coil orientation, position and geometry on the link efficiency is studied by approaching the problem from an electromagnetic perspective. In implanted devices some degree of misalignment is inevitable between external and implanted coils due to anatomical requirements. First two types of realistic misalignments are studied; a lateral displacement of the coils and an angular misalignment described as a tilt of the receiver coil. A loosely coupled system approximation is adopted since, for the coil dimensions and orientations envisaged, the mutual inductance between the transmitter and receiver coils can be neglected. Following this, formulae are derived for the magnetic field at the implanted coil when it is laterally and angularly misaligned from the external coil and a new power transfer function presented. The magnetic field solution is carried out for a number of practical antenna coil geometries currently popular in RFID and biomedical domains, such as planar and printed square, and circular spirals as well as conventional air-cored and ferromagnetic solenoids. In the second phase of this thesis, the results from the electromagnetic modeling are embodied in a near-field loosely coupled equivalent circuit for the inductive link. This allows us to introduce a power transfer formula incorporating for the first time coil characteristics and misalignment factors. This novel power transfer function allows a comparison between different coil structures such as short solenoids, with air or ferromagnetic core, planar and printed spirals with respect to power delivered at the receiver and its relative position to the transmitter. In the final stage of this work, the experimental verification of the model shows close agreement with the theoretical predictions. Using this analysis a formal design procedure is suggested that can be applied on a larger scale compared to existing methods. The main advantage of this technique is that it can be applied to a wide range of implementations without the limitations imposed by numerical modeling and existing circuital methods. Consequently, the designer has the flexibility to identify the optimum coil geometry for maximum power transfer and misalignment tolerance that suit the specifications of the application considered. This thesis concludes by suggesting a new optimisation technique for maximum power transfer with respect to read range, coil orientation, geometry and operating frequency. Finally, the limitations of this model are reiterated and possible future development of this research is discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

Leinweber, Lawrence. "Improved Cryptographic Processor Designs for Security in RFID and Other Ubiquitous Systems." Cleveland, Ohio : Case Western Reserve University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1238734353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Paiva, Jailton Carlos de. "e-Pontos: Uma solu??o embarcada de automa??o comercial aplicada a clubes de fidelidade baseado em tecnologia RFID e esmart card." Universidade Federal do Rio Grande do Norte, 2012. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15440.

Full text
Abstract:
Made available in DSpace on 2014-12-17T14:56:06Z (GMT). No. of bitstreams: 1 JailtonCP_DISSERT.pdf: 2190503 bytes, checksum: ee26df46d54432b596d1d87d4b66b75c (MD5) Previous issue date: 2012-07-27
In practically all vertical markets and in every region of the planet, loyalty marketers have adopted the tactic of recognition and reward to identify, maintain and increase the yield of their customers. Several strategies have been adopted by companies, and the most popular among them is the loyalty program, which displays a loyalty club to manage these rewards. But the problem with loyalty programs is that customer identification and transfer of loyalty points are made in a semiautomatic. Aiming at this, this paper presents a master's embedded business automation solution called e-Points. The goal of e-Points is munir clubs allegiances with fully automated tooling technology to identify customers directly at the point of sales, ensuring greater control over the loyalty of associate members. For this, we developed a hardware platform with embedded system and RFID technology to be used in PCs tenant, a smart card to accumulate points with every purchase and a web server, which will provide services of interest to retailers and customers membership to the club
Em praticamente todos os mercados verticais e em cada regi?o do planeta, os comerciantes de fidelidade adotaram a t?tica de reconhecimento e recompensa para identificar, manter e aumentar o rendimento de seus clientes. V?rias estrat?gias t?m sido adotadas pelas empresas, e a mais popular entre elas ? o programa de fidelidade, que exibe um clube de fidelidade para gerenciar essas recompensas. Mas o problema com os programas de fidelidade ? que a identifica??o dos clientes e a transmiss?o dos pontos de fidelidade s?o feitas de forma semiautom?tica. Visando isto, o presente trabalho de mestrado apresenta uma solu??o embarcada de automa??o comercial intitulada e-Pontos. O objetivo do e-Pontos ? munir os clubes de fidelidades com ferramental tecnol?gico totalmente automatizado para identificar os clientes diretamente nos pontos de vendas, garantindo um maior controle dos pontos de fidelidade dos membros associados. Para isso, foi desenvolvida uma plataforma de hardware com sistema embarcado e tecnologia RFID que ser? utilizada nos PCs dos lojistas, um smart card para acumular os pontos a cada compra e um servidor web, o qual disponibilizar? servi?os de interesse para os lojistas e os clientes conveniado ao clube
APA, Harvard, Vancouver, ISO, and other styles
8

Spadazzi, Gianluca. "Middleware per Internet of Things: Java Embedded come caso di studio." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7865/.

Full text
Abstract:
Grazie al progresso dell'elettronica, ai giorni nostri, è possibile costruire dispositivi elettronici molto piccoli, che col passare del tempo lo sono sempre più. Questo ci permette di poter imboccare nuove strade nel mondo dell'informatica, sfruttando proprio questo fatto. Le dimensioni ridotte dei dispositivi in commercio, come sensori, attuatori, tag e tanto altro, sono particolarmente adatte a nuovi scenari applicativi. Internet of Things è una visione in cui Internet viene esteso alle cose. Facendo largo uso di dispositivi come sensori e tag è possibile realizzare sistemi intelligenti che possono avere riscontri positivi nella vita di tutti i giorni. Tracciare la posizione degli oggetti, monitorare pazienti da remoto, rilevare dati sull'ambiente per realizzare sistemi automatici (ad esempio regolare automaticamente la luce o la temperatura di una stanza) sono solo alcuni esempi. Internet of Things è la naturale evoluzione di Internet, ed è destinato a cambiare radicalmente la nostra vita futura, poichè la tecnologia sarà sempre più parte integrante della nostra vita, aumentando sempre più il nostro benessere e riducendo sempre più il numero delle azioni quotidiane da compiere. Sempre più sono middleware, le piattaforme e i sistemi operativi che nascono per cercare di eliminare o ridurre le problematiche relative allo sviluppo di sistemi di questo genere, e lo scopo di questa tesi è proprio sottolinearne l'importanza e di analizzare gli aspetti che questi middleware devono affrontare. La tesi è strutturata in questo modo: nel capitolo uno verrà fatta una introduzione a Internet of Things, analizzando alcuni degli innumerevoli scenari applicativi che ne derivano, insieme però alle inevitabili problematiche di tipo tecnologico e sociale. Nel secondo capitolo verranno illustrate le tecnologie abilitanti di Internet of Things, grazie alle quali è possibile realizzare sistemi intelligenti. Nel terzo capitolo verranno analizzati gli aspetti relativi ai middleware, sottolineandone l'importanza e prestando attenzione alle funzioni che devono svolgere, il tutto riportando anche degli esempi di middleware esistenti. Nel quarto capitolo verrà approfondito il middleware Java Embedded di Oracle.
APA, Harvard, Vancouver, ISO, and other styles
9

Vitale, Clemente. "Internet of Things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3184/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Doan, Xuan Tien. "Multivariate data analysis for embedded sensor networks within the perishable goods supply chain." Thesis, University of Manchester, 2011. https://www.research.manchester.ac.uk/portal/en/theses/multivariate-data-analysis-for-embedded-sensor-networks-within-the-perishable-goods-supply-chain(0b555420-442b-4787-b730-8acf95878996).html.

Full text
Abstract:
This study was aimed at exploring data analysis techniques for generating accurate estimates of the loss in quality of fresh fruits, vegetables and cut flowers in chilled supply chains based on data from advanced sensors. It was motivated by the recent interest in the application of advanced sensors, by emerging concepts in quality controlled logistics, and by the desire to minimise quality losses during transport and storage of the produce. Cut roses were used in this work although the findings will also be applicable to other produce. The literature has reported that whilst temperature was considered to be the most critical post-harvest factor, others such as growing conditions could also be important in the senescence of cut roses. Kinetic modelling was the most commonly used modelling approach for shelf life predictions of foods and perishable produce, but not for estimating vase life (VL) of cut flowers, and so this was explored in this work along with multiple linear regression (MLR) and partial least squares (PLS). As the senescence of cut roses is not fully understood, kinetic modelling could not be implemented directly. Consequently, a novel technique, called Kinetic Linear System (KLS), was developed based on kinetic modelling principles. Simulation studies of shelf life predictions for tomatoes, mushrooms, seasoned soybean sprouts, cooked shrimps and other seafood products showed that the KLS models could effectively replace the kinetic ones. With respect to VL predictions KLS, PLS and MLR were investigated for data analysis from an in-house experiment with cut roses from Cookes Rose Farm (Jersey). The analysis concluded that when the initial and final VLs were available for model calibration, effective estimates of the post-harvest loss in VL of cut roses could be obtained using the post-harvest temperature. Otherwise, when the initial VLs were not available, such effective estimates could not be obtained. Moreover, pre-harvest conditions were shown to correlate with the VL loss but the correlation was too weak to produce or improve an effective estimate of the loss. The results showed that KLS performance was the best while PLS one could be acceptable; but MLR performance was not adequate. In another experiment, boxes of cut roses were transported from a Kenyan farm to a UK distribution centre. Using KLS and PLS techniques, the analysis showed that the growing temperature could be used to obtain effective estimates of the VLs at the farm, at the distribution centre and also the in-transit loss. Further, using post-harvest temperature would lead to a smaller error for the VL at the distribution centre and the VL loss. Nevertheless, the estimates of the VL loss may not be useful practically due to the excessive relative prediction error. Overall, although PLS had a slightly smaller prediction error, KLS worked effectively in many cases where PLS failed, it could handle constraints while PLS could not.In conclusion, KLS and PLS can be used to generate effective estimates of the post-harvest VL loss of cut roses based on post-harvest temperature stresses recorded by advanced sensors. However, the estimates may not be useful practically due to significant relative errors. Alternatively, pre-harvest temperature could be used although it may lead to slightly higher errors. Although PLS had slightly smaller errors KLS was more robust and flexible. Further work is recommended in the objective evaluations of product quality, alternative non-linear techniques and dynamic decision support system.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Embedded RFID"

1

Min, Chen. RFID technologies for Internet of Things. Cham, Switzerland: Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lu, Yan, ed. The Internet of things: From RFID to the next-generation pervasive networked systems. Boca Raton, FL: Taylor & Francis, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chabanne, Harvé, Pascal Urien, and Jean-Ferdinand Susini. RFID and the Internet of Things. Wiley & Sons, Incorporated, John, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chabanne, Harv, Pascal Urien, and Jean-Ferdinand Susini. Rfid and the Internet of Things. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chabanne, Harvé, Pascal Urien, Jean-Ferdinand Susini, Jean-Ferdinand Susini, and Harvé Chabanne. RFID and the Internet of Things. Wiley & Sons, Incorporated, John, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chabanne, Harvé, Pascal Urien, and Jean-Ferdinand Susini. RFID and the Internet of Things. Wiley & Sons, Incorporated, John, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Min, and Shigang Chen. RFID Technologies for Internet of Things. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chabanne, Harvé, Pascal Urien, and Jean-Ferdinand Susini. RFID and the Internet of Things. Wiley & Sons, Incorporated, John, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Min, and Shigang Chen. RFID Technologies for Internet of Things. Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yang, Laurence T., Lu Yan, Yan Zhang, and Huansheng Ning. Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems. Auerbach Publishers, Incorporated, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Embedded RFID"

1

Guyot, Vincent. "RFID Technology." In Communicating Embedded Systems, 113–38. Hoboken, NJ USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118557624.ch4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Rajesh, Anita Gehlot, Bhupendra Singh, and Sushabhan Choudhury. "RFID Card-Based Attendance System." In Arduino-Based Embedded Systems, 247–54. Boca Raton : Taylor & Francis, CRC Press, 2018.: CRC Press, 2017. http://dx.doi.org/10.1201/9781315162881-21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmad, Mohamad Hafiz, Nurul Amierah Cheah Yasser Cheah, and Mohamad Tarmizi Abu Seman. "Embedded RFID System: OKU Smart Parking." In Lecture Notes in Electrical Engineering, 203–19. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2406-3_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yasser Cheah, N. A. C., Mohamad Tarmizi bin Abu Seman, M. N. Abdullah, and Sattar Din. "Embedded RFID System: OKU Smart Card Detector." In IT Applications for Sustainable Living, 81–89. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-40751-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saito, Junichiro, Jae-Cheol Ryou, and Kouichi Sakurai. "Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags." In Embedded and Ubiquitous Computing, 879–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30121-9_84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hwang, Seok Joong, Joon Goo Lee, Seon Wook Kim, Sunshin Ahn, Si-Gyung Koo, Jihun Koo, Kyung Ho Park, and Woo Shik Kang. "A Multi-protocol Baseband Modem Processor for a Mobile RFID Reader." In Embedded and Ubiquitous Computing, 785–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11802167_79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sarma, Sanjay E., Stephen A. Weis, and Daniel W. Engels. "RFID Systems and Security and Privacy Implications." In Cryptographic Hardware and Embedded Systems - CHES 2002, 454–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36400-5_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Ming-Yang, Ching-Nung Yang, and Chi-Sung Laih. "Authorized Tracking and Tracing for RFID Tags." In Emerging Directions in Embedded and Ubiquitous Computing, 435–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11807964_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Deolalikar, Vinay, John Recker, Malena Mesarina, and Salil Pradhan. "Optimal Scheduling for Networks of RFID Readers." In Embedded and Ubiquitous Computing – EUC 2005 Workshops, 1025–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596042_105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Birari, Shailesh M., and Sridhar Iyer. "PULSE: A MAC Protocol for RFID Networks." In Embedded and Ubiquitous Computing – EUC 2005 Workshops, 1036–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596042_106.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Embedded RFID"

1

Shan Jiang and Stavros V. Georgakopoulos. "Optimum power transmission of wireless sensors embedded in concrete." In 2010 IEEE International Conference on RFID (IEEE RFID 2010). IEEE, 2010. http://dx.doi.org/10.1109/rfid.2010.5467275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kantareddy, S. N. R., R. Bhattacharyya, and S. Sarma. "Towards low-cost object tracking: Embedded RFID in golf balls using 3D printed masks." In 2017 IEEE International Conference on RFID (RFID). IEEE, 2017. http://dx.doi.org/10.1109/rfid.2017.7945599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ritamaki, Matti, and Antti Ruhanen. "Embedded passive UHF RFID seal tag for metallic returnable transit items." In 2010 IEEE International Conference on RFID (IEEE RFID 2010). IEEE, 2010. http://dx.doi.org/10.1109/rfid.2010.5467263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mohammed, Naaser A., Kenneth R. Demarest, and Daniel D. Deavours. "Analysis and synthesis of UHF RFID antennas using the embedded T-match." In 2010 IEEE International Conference on RFID (IEEE RFID 2010). IEEE, 2010. http://dx.doi.org/10.1109/rfid.2010.5467276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fummi, F., and G. Perbellini. "Embedded Design Exploration of EPCglobal Architecture." In 2007 IEEE International Conference on RFID. IEEE, 2007. http://dx.doi.org/10.1109/rfid.2007.346172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Fagui, Yuedong Lin, Yongxiong Ruan, and Haipeng Yu. "Lightweight-ALE-Based Embedded RFID Middleware." In 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2009. http://dx.doi.org/10.1109/wicom.2009.5305733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Renuka, N., Ng Chin Nan, and Widad Ismail. "Embedded RFID tracking system for hospital application using WSN platform." In 2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA 2013). IEEE, 2013. http://dx.doi.org/10.1109/rfid-ta.2013.6694539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

CACCAMI, Maria Cristina, Sara AMENDOLA, and Cecilia OCCHIUZZI. "Method and system for reading RFID tags embedded into tires on conveyors." In 2019 IEEE International Conference on RFID Technology and Applications (RFID-TA). IEEE, 2019. http://dx.doi.org/10.1109/rfid-ta.2019.8892245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kanwar, Kelash, Thomas Mager, Ulrich Hilleringmann, Volker Geneiss, and Christian Hedayat. "Embedded UHF RFID tag design process for rubber transmission belt using 3D model." In 2014 IEEE International Conference on RFID-Technologies and Applications (RFID-TA). IEEE, 2014. http://dx.doi.org/10.1109/rfid-ta.2014.6934208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mayordomo, Iker, Norbert van der Heyd, Tobias Drager, and Josef Bernhard. "Development of a Wireless Power Transmission System for Embedded Passive Sensors Using LF RFID Technology." In 2012 4th International EURASIP Workshop on RFID Technology (EURASIP RFID). IEEE, 2012. http://dx.doi.org/10.1109/rfid.2012.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography