Academic literature on the topic 'Reader-to-reader interference'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Reader-to-reader interference.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Reader-to-reader interference"

1

Do-Yun Kim, Hyun-Goo Yoon, Byung-Jun Jang, and Jong-Gwan Yook. "Effects of Reader-to-Reader Interference on the UHF RFID Interrogation Range." IEEE Transactions on Industrial Electronics 56, no. 7 (July 2009): 2337–46. http://dx.doi.org/10.1109/tie.2009.2012451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yoon, H., and B. J. Jang. "Performance Degradation Analysis of UHF-Band RFID System Due To Reader-To-Reader Interference." Journal of Electromagnetic Waves and Applications 26, no. 5-6 (April 2012): 681–94. http://dx.doi.org/10.1080/09205071.2012.710789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hou, Pengfei, Jianping Gong, and Jumin Zhao. "A Physical Layer Security Enhancement Scheme under the Ambient Backscatter System." Symmetry 13, no. 1 (December 22, 2020): 5. http://dx.doi.org/10.3390/sym13010005.

Full text
Abstract:
In this paper, we proposed a scheme that Injects artificial noise from the tag end (IANT) to enhance the physical layer security of the ambient backscatter communication (ABC) system. The difference between the ABC system and the traditional radio frequency identification system is whether it uses the radio frequency (RF) signals in the environment to supply energy and modulation information for passive tags. In the IANT scheme, we select the best tag to communicate with the reader according to the channel quality between tags and reader, and at the same time select another tag to generate artificial noise that affects the receiving effect of the eavesdropper. This paper uses the method of generating noise copies in the reader to reduce the interference of artificial noise on the signal received by the reader. The simulation results show that with the increase in channel quality between tags and reader and the increase in the number of tags, the proposed IANT scheme is significantly superior to the contrast scheme in terms of system achievable secrecy rate, effectively enhancing the physical layer security of the ABC system.
APA, Harvard, Vancouver, ISO, and other styles
4

Sayeed, Md SakilIbne, YoungSoo Kim, Hoongee Yang, and Jong-Gwan Yook. "A solution to the RFID reader interference problem using adaptive beam-forming approach." IETE Technical Review 28, no. 1 (2011): 17. http://dx.doi.org/10.4103/0256-4602.74511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Talhouni, Khaled. "Stephen J. Glain. Mullahs, Merchants, and Militants: The Economic Collapse of the Arab World. New York: St. Martin’s Press, 2005. 350 pages. $25.95. Hardback." Pakistan Development Review 45, no. 3 (September 1, 2006): 498–99. http://dx.doi.org/10.30541/v45i3pp.498-499.

Full text
Abstract:
In this book, Former Wall Street Journal reporter Stephen Glain sets out to answer an extremely broad and difficult question: namely why is it that the Arab world, specifically the Levantine region, has consistently underperformed economically since the beginning of the 20th century. The book provides the reader with a somewhat in-depth analysis of the political, social and economic state of six Arab nations (Lebanon, Syria, Jordan, the Palestinian territories, Egypt, and Iraq). By breaking down his analysis into country-specific chapters, Glain enables the reader to understand the multi-faceted problems facing the region as a whole. In doing so, Glain shows the reader a common thread of bad governance, corruption, negative external interference, and protectionism; the thread that runs through all these nations, causing economic decay.
APA, Harvard, Vancouver, ISO, and other styles
6

Treffers-Daller, Jeanine. "Borrowing and shift-induced interference: Contrasting patterns in French–Germanic contact in Brussels and Strasbourg." Bilingualism: Language and Cognition 2, no. 2 (August 1999): 77–80. http://dx.doi.org/10.1017/s1366728999210206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lan, Hai Yan, Hong Tao Song, Yun Long Zhao, and Guo Yin Zhang. "A Resource Allocation Algorithm in RFID System." Advanced Materials Research 694-697 (May 2013): 2462–65. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2462.

Full text
Abstract:
For problem of limited resources in the RFID (Radio frequency identification) system, a power resource allocation scheme is proposed. The method aims to maximize the system throughput, using cultural algorithm (CA) to search for the optimal power allocation scheme. By dynamically adjusting the signal transmission power of the reader, the overlap area between the reader can be reduced so that the maximum reading range can be obtained. Simulation results show that the algorithm has better performance in the system throughput and energy consumption, reducing the impact of interference between the readers and efficiently using the resources in RFID system.
APA, Harvard, Vancouver, ISO, and other styles
8

Aronsson, Mattias. "Den litteraturvetenskapliga receptionsforskningen och internet." Tidskrift för litteraturvetenskap 45, no. 1 (January 1, 2015): 33–44. http://dx.doi.org/10.54797/tfl.v45i1.9022.

Full text
Abstract:
Reader-Response Criticism and the Internet: A Methodological Discussion This article explores connections between Internet-based research and reader-response criticism, aiming to critically discuss the methodologies used in this particular field of research. First, the history of reader-response studies is briefly presented, with reference to theorists such as Richards, Rosenblatt, Robbe-Grillet, Iser and Jauss. It is noted that, for the past 15 years, people have utilised the Internet as a basis for the discussion of literary and reading-related topics. Researchers in this field may access reviews and commentaries on open web-based venues such as personal homepages, blogs and online forums (i.e. message boards and discussion sites). The material available on these sites is interesting because of its ”spontaneous” nature; that is, such material has been formulated and uploaded without the interference of the researcher. The article presents one concrete example of an Internet-based reader-response study, discussing a number of pros and cons of the chosen methodology– including some important ethical considerations that arise when the researcher’s corpus is composed of material taken from the Internet. One of the conclusions of the paper is that many aspects of the general public’s web-based responses to literature are yet to be explored by the research community.
APA, Harvard, Vancouver, ISO, and other styles
9

Ripperger, Simon P., Niklas Duda, Alexander Kölpin, and Gerald G. Carter. "Simultaneous Monitoring of the Same Animals with PIT Tags and Sensor Nodes Causes No System Interference." Animal Behavior and Cognition 7, no. 4 (November 1, 2020): 531–36. http://dx.doi.org/10.26451/abc.07.04.05.2020.

Full text
Abstract:
Recent technological advances have multiplied the variety of biologgers used in wildlife research, particularly with small-bodied animals. Passive integrated transponders (PIT) have been used for decades to log visits of tagged animals at reader-equipped artificial feeders or roost boxes. More recently, novel miniaturized sensor nodes can collect data on social encounters among tagged individuals in any location. Combining these systems allows researchers to gather high-resolution tracking data on certain individuals from their long-term PIT-tagged animal populations. However, there can be a risk of interference among tracking systems. Here we tested whether placing an additional biologging sensor on top of a PIT tag might attenuate the magnetic field reaching the PIT tag and, in turn, hamper reading success of the radio-frequency identification (RFID) reader. We also evaluated data transmission by a digital sensor node in the presence of a magnetic field created by the RFID antenna. The combination of this RFID system and wireless biologging sensors works without error, suggesting that the simultaneous use of PIT tags and other digital biologgers, e.g., miniaturized GPS-loggers, should also work together properly when communication channels do not overlap. The combination of long-term monitoring with PIT tags and short-term tracking with biologging sensor nodes creates exciting new opportunities to gather rich social data when individuals are not present at RFID reader stations.
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Yoon-Deock, Do-Yun Kim, Hyun-Goo Yoon, Jong-Gwan Yook, and Byung-Jun Jang. "A Study on the Reduction of RFID System's Interrogation Range with Respect to Reader Interference." Journal of Korean Institute of Electromagnetic Engineering and Science 18, no. 7 (July 31, 2007): 731–38. http://dx.doi.org/10.5515/kjkiees.2007.18.7.731.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Reader-to-reader interference"

1

Brontë, Charlotte, and Tim Dolin. Villette. Edited by Margaret Smith. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199536658.001.0001.

Full text
Abstract:
‘I am only just returned to a sense of the real world about me, for I have been reading Villette, a still more wonderful book than Jane Eyre.’ George Eliot Lucy Snowe, in flight from an unhappy past, leaves England and finds work as a teacher in Madame Beck's school in 'Villette'. Strongly drawn to the fiery autocratic schoolmaster Monsieur Paul Emanuel, Lucy is compelled by Madame Beck's jealous interference to assert her right to love and be loved. Based in part on Charlotte Brontë's experience in Brussels ten years earlier, Villette (1853) is a cogent and dramatic exploration of a woman's response to the challenge of a constricting social environment. Its deployment of imagery comparable in power to that of Emily Brontë's Wuthering Heights, and its use of comedy-ironic or exuberant-in the service of an ultimately sombre vision, make Villette especially appealing to the modern reader. ABOUT THE SERIES: For over 100 years Oxford World's Classics has made available the widest range of literature from around the globe. Each affordable volume reflects Oxford's commitment to scholarship, providing the most accurate text plus a wealth of other valuable features, including expert introductions by leading authorities, helpful notes to clarify the text, up-to-date bibliographies for further study, and much more.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Reader-to-reader interference"

1

Douglass, Frederick. "The Author’s Parentage." In My Bondage and My Freedom. Oxford University Press, 2019. http://dx.doi.org/10.1093/owc/9780198820710.003.0006.

Full text
Abstract:
Author’s father shrouded in mystery—author’s mother—her personal appearance—interference of slavery with the natural affections of mother and children—situation of author’s mother—her nightly visits to her boy—striking incident—her death—her place of burial. If the reader will now be kind enough to allow me time to...
APA, Harvard, Vancouver, ISO, and other styles
2

Marcia, Valeria, and Kevin C. Desouza. "Weaponizing Information Systems for Political Disruption." In Defending Democracies, 73–92. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197556979.003.0004.

Full text
Abstract:
Today, information systems are regularly weaponized for political disruption. This threat now encompasses electoral processes, given their increasing dependence on information systems both directly and indirectly. The chapter elaborates on a framing devise—ALERT (the Actors, Levers, Effects, and Response Taxonomy)—to study how information systems can be manipulated and the associated set of responses to such manipulation, which in turn can generate theories about election interference. Illustrative examples of such interference guide the reader through the ALERT framework in the foreign election interference context. Through the description of the ALERT framework and the copious examples reported, the chapter concludes by underlining the importance of a clear understanding of the dynamics related to the Actors involved in information warfare, the Levers used, the Effects in the political and, specifically, electoral fields, which all serve as a tool for obtaining appropriate Responses in the fight against weaponization for political disruption.
APA, Harvard, Vancouver, ISO, and other styles
3

Pal, Kamalendu. "Evaluation of RFID Tag Anti-Collision Algorithms in Supply Chain Automation." In The IoT and the Next Revolutions Automating the World, 49–65. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-9246-4.ch004.

Full text
Abstract:
Radio Frequency Identification (RFID) is a technology that uses radio frequency signals to identify tagged objects. RFID is an important technology used by the Internet of Things (IoT) applications. This technology enables communication between the main devices used in RFID system, the reader, and the tags. The tags share a common communication channel. Therefore, if more than one tag tries to send information at the same time, the reader will be incapable of differentiating these signals in the case of radio signals interference. This phenomenon is known as tag collision problem. The problem of tag collision is one of the major disadvantages for fast tagged-object identification in supply chain management. This chapter describes four different types of binary search algorithms for avoidance of tag collision, and then presents a performance measurement mechanism for RFID application system. Finally, simulation-based experimental results on the performance of these algorithms are presented.
APA, Harvard, Vancouver, ISO, and other styles
4

Winnicott, Donald W. "Letter to the British Medical Journal." In The Collected Works of D. W. Winnicott, 35–36. Oxford University Press, 2016. http://dx.doi.org/10.1093/med:psych/9780190271350.003.0003.

Full text
Abstract:
In this letter to the British Medical Journal, Winnicott discusses how good citizenship comes from the life of the child in his own home, including the first relationship between infant and mother. On the basis of this relationship, more complex relationships are developed at home and in the wider world. If these things fail, citizenship (or something else) has to be taught. Among other issues, he insists that professionals should refrain from interference with infants and small children, that avoidable physical treatment should not be undertaken, nor should infants and small children be taken from home except in case of dire necessity. He reminds the reader that no-one can tell a mother how to be a mother or a teacher how to teach; parents and teachers have to carry on intuitively.
APA, Harvard, Vancouver, ISO, and other styles
5

Jackson, Valerie. "Pain Psychology." In Pain Care Essentials, edited by Mark Schumacher and Beth B. Hogans, 75–86. Oxford University Press, 2019. http://dx.doi.org/10.1093/med/9780199768912.003.0006.

Full text
Abstract:
Chapter 5 covers the foundations of pain clinical care in the biopsychosocial model, demonstrates how this model is applied in psychological assessment and treatment planning for patients with chronic pain, and introduces the reader to the foundational concepts in pain psychology and the major categories of psychological treatments for pain. The biopsychosocial model is examined and explained in detail with application to the case scenario that opens the chapter. The assessment of patients with chronic pain is described, and the benefits and potential risks of psychological assessment are characterized. Pain psychology concepts, including pain catastrophizing, pain anxiety, and passive coping, are explained. The major treatment paradigms, including psychoeducation, cognitive behavioral therapy (CBT), acceptance commitment therapy, relaxation strategies, mindfulness-based therapies, biofeedback, and treatment responses, are described in detail. An application of CBT is presented, explaining to the reader the process of feeding forward through automatic thoughts, feelings, and behaviors and illustrating how this is changed positively by CBT to reduce the negative impacts of chronic pain on thoughts, feelings, and behaviors, leading ultimately to less pain and less pain interference. Pain psychology is introduced in this chapter in the context of collaborative interprofessional care models.
APA, Harvard, Vancouver, ISO, and other styles
6

Peterson, Michael. "Responsibility and the Non(bio)degradable." In Eco-Deconstruction. Fordham University Press, 2018. http://dx.doi.org/10.5422/fordham/9780823279500.003.0011.

Full text
Abstract:
“Responsibility and the Non(bio)degradable” is an effort to take seriously a claim found in the Human Interference Task Force’s report on the possibility of future generations compromising the isolation of interred nuclear waste materials at the Waste Isolation Pilot Plant. The HITF writes: “Future societies with knowledge of the existence and location of the repository, its contents, and risks of interference bear the full responsibility for any of their actions that can reasonably be expected to adversely affect the performance of the repository.” Through a reading of Jacques Derrida’s “Biodegradables: Seven Diary Fragments,” the chapter argues that the notion of “full responsibility” is inadequate to a thinking of responsibilities toward and of future generations. By thinking the endurance of nuclear waste through Derrida’s reading of “(bio)degradability” and “non(bio)degradability”—here thought alongside the well-known Derridean watchword “iterability”—the reader comes to see the necessity of thinking the impossibility of responsibility ever being inherited in its entirety or coming to an end for any generation in particular. As such, a more rigorous development of responsibility is called for, especially when applied to material or environmental problems.
APA, Harvard, Vancouver, ISO, and other styles
7

LeFanu, Sarah. "Voyaging Out." In Something of Themselves, 185–202. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197501443.003.0009.

Full text
Abstract:
This chapter takes the reader through the months immediately preceding the departure to South Africa of the three protagonists of the book, Rudyard Kipling, Arthur Conan Doyle and Mary Kingsley, in, respectively, January, February and March 1900. We see Rudyard and Carrie Kipling enduring their first Christmas without their daughter Josephine, and Kipling’s belief in the necessity and the good of war in South Africa, despite the military reversals of its early months; we see Conan Doyle throwing himself into war preparations and being inoculated against typhoid during the voyage; we see Mary Kingsley giving her last lecture in London at the Imperial Institute, and, on board ship, writing a critique of Christianity and a plea in favor of African nationalism, stressing the link between African land ownership and freedom from Western interference.
APA, Harvard, Vancouver, ISO, and other styles
8

Snir, Reuven. "Outlines of Diachronic Intersystemic Development." In Modern Arabic Literature. Edinburgh University Press, 2017. http://dx.doi.org/10.3366/edinburgh/9781474420518.003.0004.

Full text
Abstract:
This chapter presents some outlines of the diachronic intersystemic development of the modern Arabic literary system. The space between the text, its author, and the reader is understood as constituting both an economic environment (e.g. literary markets, publishing) and a sociocommunicative system that passes the meaning potential of the text through various filters (e.g. criticism, literary circles, groups, salons, public opinion) in order to concretize and realize it. All other spaces related to literary production and consumption, including the linguistic, spiritual, social, national, and economic spaces, are also considered, together with looking at the interaction of literature with, for example, religion, territory, state nationalism, language, politics, economy, gender, electronic media, and philosophy, as well as foreign literatures and cultures and examples of reciprocal interference between Arabic and Western literatures in the twentieth century and the start of the twenty-first century.
APA, Harvard, Vancouver, ISO, and other styles
9

Sawyer, L., and M. A. Turner. "X-ray analysis." In Crystallization of Nucleic Acids and Proteins. Oxford University Press, 1999. http://dx.doi.org/10.1093/oso/9780199636792.003.0018.

Full text
Abstract:
This chapter covers the preliminary characterization of the crystals in order to determine if they are suitable for a full structure determination. Probably more frustrating than failure to produce crystals at all, is the growth of beautiful crystals which do not diffract, which have very large unit cell dimensions, or which decay very rapidly in the X-ray beam, though this last problem has been largely overcome by freezing the sample. It is impossible in one brief chapter to give more than a flavour of what the X-ray crystallographic technique entails and it is assumed that the protein chemist growing the crystals will have contact with a protein crystallographer, who will carry out the actual structure determination and in whose laboratory state-of-the-art facilities exist. However, preliminary characterization can often be carried out with little more than the equipment which is widely available in Chemistry and Physics Departments and so the crystal grower remote from a protein crystallography laboratory can monitor the success of their experiments. The reader should refer to the first edition for protocols useful for photographic characterization but such techniques are seldom used nowadays. It must be remembered, in any case, that X-rays are dangerous and the inexperienced should not try to X-ray protein crystals without help. It is necessary to provide an overview of X-ray crystallography, to put the preliminary characterization in context. For a general description of the technique the reader should refer to Glusker et al. (1) or Stout and Jensen (2). For protein crystallography in particular, the books by McRee (3) and Drenth (4) describe many of the advances since the seminal work of Blundell and Johnson (5). Amongst many excellent introductory articles, those by Bragg (6), published years ago, and Glusker (7) are particularly recommended. The scattering or diffraction of X-rays is an interference phenomenon and the interference between the X-rays scattered from the atoms in the structure produces significant changes in the observed diffraction in different directions. This variation in intensity with direction arises because the path differences taken by the scattered X-ray beams are of the same magnitude as the separation of the atoms in the molecule.
APA, Harvard, Vancouver, ISO, and other styles
10

Baklezos, Anargyros T., and Neoclis G. Hadjigeorgiou. "Magnetic Sensors for Space Applications and Magnetic Cleanliness Considerations." In Recent Trends on Electromagnetic Environmental Effects for Aeronautics and Space Applications, 147–85. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4879-0.ch006.

Full text
Abstract:
This chapter is composed by three parts. The first is an introductory part, providing general information about magnetism and related phenomena. Magnetic materials are also discussed and presented. Afterwards, the magnetic field and various measurement techniques are discussed. In the second part, different magnetic sensors used in a laboratory or space are presented. Magnetic sensors that are discussed include anisotropic magneto-resistance (AMR), giant magneto-resistance (GMR), giant magneto-impedance (GMI), flux-gate, and superconducting quantum interference device (SQUID). Although some of them may be outdated and well known, they are widespread, and they still pose an excellent choice for certain applications. Advances in magnetometers also presented in order to provide the reader with the recent trends in the field. Magnetic cleanliness is an important factor both in calibration and in normal operation of a system; in the third part, current techniques to isolate a system from the external magnetic field providing cleanliness are discussed.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Reader-to-reader interference"

1

Ferrero, R., F. Gandino, Linchao Zhang, B. Montrucchio, and M. Rebaudengo. "Simulating Reader-to-Reader Interference in RFID Systems." In 2013 Workshops of 27th International Conference on Advanced Information Networking and Applications (WAINA). IEEE, 2013. http://dx.doi.org/10.1109/waina.2013.90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ferrero, Renato, and Filippo Gandino. "Effect of mobility on RFID reader-to-reader interference." In 2018 6th International EURASIP Workshop on RFID Technology (EURFID). IEEE, 2018. http://dx.doi.org/10.1109/eurfid.2018.8611709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Linchao, Renato Ferrero, Filippo Gandino, and Maurizio Rebaudengo. "Simulation and Evaluation of the Interference Models for RFID Reader-to-Reader Collisions." In International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2536853.2536877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Linchao, Renato Ferrero, Filippo Gandino, and Maurizio Rebaudengo. "A Comparison between Single and Additive Contribution in RFID Reader-to-Reader Interference Models." In 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2012. http://dx.doi.org/10.1109/imis.2012.122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Seo, H., and C. Lee. "A New GA-Based Resource Allocation Scheme for a Reader-to-Reader Interference Problem in RFID Systems." In ICC 2010 - 2010 IEEE International Conference on Communications. IEEE, 2010. http://dx.doi.org/10.1109/icc.2010.5502751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Truong, Phuong, Alex Phan, Nicolas Williams, and Frank E. Talke. "Development of a Portable Reader for an Optical Intraocular Pressure Sensor." In ASME 2019 28th Conference on Information Storage and Processing Systems. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/isps2019-7521.

Full text
Abstract:
Abstract This paper presents various designs of a handheld reader for an interferometric intraocular pressure measurement system. Reflected lights from the implanted sensor form interference fringes which can be captured using a camera. Image processing software was used to analyze the fringe pattern and determine the eye pressure. Various light sources were considered and the LED with a laser line filter was selected for its ability to generate quality fringe patterns and portability. Three generations of handheld readers have been developed and tested. Interference patterns acquired from each reader were compared to assess the limiting and promising features related to measurement time, form factor, working distance, ease of use, and quality of fringes. Results show that the DSLR-based reader has the highest quality images with the largest form factor while the smartphone-based reader offers the smallest form factor with ease of use and accessibility for the patient.
APA, Harvard, Vancouver, ISO, and other styles
7

Bekkali, Abdelmoula, Sicheng Zou, Abdullah Kadri, and Richard Penty. "Impact of reader-to-tag interference and forward link fading on RFID system performance." In 2014 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2014. http://dx.doi.org/10.1109/wcnc.2014.6951987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yi, Zhou, Zi Qin Phua, Vitor N. B. Rangel, and Johné M. Parker. "Experimental Investigation on Tags Placement Affecting the Efficient Encoding of Multiple Passive UHF RFID Tags With Unique Identifiers." In ASME 2016 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/imece2016-67472.

Full text
Abstract:
Recently, the Internet of things (IoT) has emerged as a promising solution for several industrial applications. One of the key components in IoT is passive radio frequency identification (RFID) tags which do not require a power source for operations. Specifically, ultra-high frequency (UHF) tags are studied in this paper. However, due to factors such as tag-to-tag interference and inaccurate localization, RFID tags that are closely spaced together are difficult to detect and program accurately with unique identifiers. This paper investigates several factors that affect the ability to encode a specific tag with unique information in the presence of other tags, such as reader power level, tag-to-antenna distance, tag-to-tag distance and tag orientation. ANOVA results report reader power level and tag spacing, along with effect interactions power level*tag space and tag space*tag orientation to be significant at the levels investigated. Results further suggest a preliminary minimum tag-to-tag spacing which enables the maximum number of tagged items to be uniquely encoded without interference. This finding can significantly speed up the process of field programming in item-level tagging.
APA, Harvard, Vancouver, ISO, and other styles
9

Shukla, Priyavrat, Raj Malpani, Michael Dardis, and Mark Norrid. "Fracture Plug Completions: Evolution, Technological Advancements, and Reservoir Simulation Guided Implications." In SPE Annual Technical Conference and Exhibition. SPE, 2022. http://dx.doi.org/10.2118/210396-ms.

Full text
Abstract:
Abstract Hydraulic fracturing operations are increasingly becoming larger through a reduction in cluster spacing, wellbore proximity, and fast-paced "zipper" operations to maximize efficiency. Low-cost operation is the primary motive behind this. Some issues hindering optimal performance include fracturing plug failure, under/over stimulation and adverse well performance as stated in published literature. This paper addresses plug effectiveness and impacts on production, fracture geometry and well spacing using a historical review of fracturing plugs and a simulation-based approach. Using numerical simulation, the study also shows that if a fracture plug failure happens, it results in under or overstimulation which leads to inefficient reservoir drainage. This paper will elaborate on the technological growth for fracturing plugs (material choices and plug architecture). A simulation-based approach will then be used to understand the effect of fracturing plug failures on well interference and the production impact on a three-well pad containing one parent and two child wells in an unconventional reservoir. A parent well will be produced for 1.5 years before two child wells are drilled and completed. Knowing the performance from the three-well case, a comparative simulation study is performed for frac plug failure at 25%, 50%, and 75% of the job pumped on the child wells. Quantifying the potential losses from plug failure can help to understand potential effects on well recovery. Such an event can be recognized through a surface pressure signature or using DAS/DTS or microseismic measurements or even using sealed wellbore pressure monitoring (SWPM) on parent wells. A comparative analysis using numerical simulation of hydraulic fractures and their calibration and production modeling is presented in this paper. Three cases for 25%, 50% and 75% understimulation is considered in failed stages. One-third of the well portion of the well is considered understimulated, one third is overstimulated and one third is treated as per design. Impact of well spacing (330 ft and 660 ft) as well as parent well depletion is considered to create a realistic scenario of plug failures to quantify the impact. Applying advanced materials and using the bottom set, mandrel-less concept has resulted in the shortest, strongest, best milling and most reliable plugs currently available. At lesser well spacing, this is even more drastic when parent wells get fracture hits due to prior depletion and also because stages larger than planned are pumped at the neighboring child wells due to fracture plug failure. This paper will enable the reader to make better decisions about the best plug technology depending on the application. It also provides a quantifiable understanding on the adverse effects of frac plug failure on production. So far, this understanding has been limited to field observations alone. This paper combines the understanding from field evidence, literature and modeling-based approach.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography