Tesi sul tema "Embedded RFID"

Segui questo link per vedere altri tipi di pubblicazioni sul tema: Embedded RFID.

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-30 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Embedded RFID".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.

1

Blischak, Andrew Travis. "Analysis of an Embedded Singularity Chipless RFID Tag". Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/43715.

Testo completo
Abstract (sommario):
The objective of this research is to explore the feasibility of a chipless RFID tag that stores a data signature in the form of complex frequency plane singularities. To this end an existing chipless RFID tag, the notched elliptical dipole tag, was analyzed first with simulations and then measurements. A pole signature was extracted from simulations, and individual poles were determined via experimentation to be attributable to specific controllable features of the tag. The poles were shown to be independent of both excitation and observation. A prototype tag was measured, and the pole signature was retrieved from the scattered fields. The tag was successfully read for different orientations showing that embedded singularities can be used as a means for encoding and retrieving data.
Master of Science
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Aksoy, Onder. "Telemedicine patient identification with RFID : an embedded approach /". Online version of thesis, 2009. http://hdl.handle.net/1850/10747.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Tirosh, Daniél. "Design utav kompakt multifrekvent RFID-system". Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-42474.

Testo completo
Abstract (sommario):
Radio Frequency Identification, RFID, is a wireless identification method which uses electromagnetic fields in order to communicate with electronic tags in the vicinity. In recent years, in conjunction with the digitalization of society, RFID has become a popular method for digital identification. RFID, as a method for digital identification, is often used for credit card payments in store, access control to locked rooms and renting books at libraries. As a result of RFID growing rapidly, different frequencies have emerged. In order to benefit from different frequencies, a multi frequency RFID-reader was designed. The purpose of this study was to examine which difficulties arise in the development of a small multi frequency RFID-reader. This study shows that a small multi frequency RFID-reader lacks the conditions that are required to reach the read distance specified in available research. Furthermore, the study shows it is difficult to read different tags simultaneously without the use of a RTOS or a multicore processor.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Copello, Claudio Gustavo. "Enhancing Data Security and Energy Efficiency on Battery-Free Programmable Platform via Adaptive Scheduling". OpenSIUC, 2016. https://opensiuc.lib.siu.edu/theses/2038.

Testo completo
Abstract (sommario):
Embedded devices constantly face two challenges in data security and energy efficiency. These devices are limited in processing such secure functions, as well as maintaining enough energy for the device to function properly. One example involves the healthcare industry, where some patients may require an Implantable Cardioverter Defibrillator (ICD) in their hearts to measure the heartbeat rate, while powered by a battery. The heartbeat rate is sent wirelessly, and the ICD can receive a jolt of electricity when the heartbeat rate reaches an abnormal value. Transmitting data alone, however, yields potential security risks when sending plain data. Work has shown that an attacker could intercept the heartbeat rate of the ICD, and intentionally send jolts of electricity. Also, replacing the battery on an ICD involves quite a painful process for the patient. A battery-less device that can receive energy wirelessly is much more convenient, but also poses a challenge where power loss may occur under long distances due to a limited supply of energy. In this paper, we design an adaptive light-weight scheduling mechanism that enhances data security, as well as improving energy efficiency on a device with such constraints. We will then prototype this scheduler on a Wireless Identification and Sensing Platform (WISP) device, which includes these constraints. Our results will then demonstrate the capabilities of such adaptive scheduling under various distances.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Fotopoulou, Kyriaki. "Inductive wireless power transfer for RFID & embedded devices : coil misalignment analysis and design". Thesis, University of Edinburgh, 2008. http://hdl.handle.net/1842/10907.

Testo completo
Abstract (sommario):
Radio frequency inductive coupling is extensively employed for wireless powering of embedded devices such as low power passive near-field RFID systems and implanted sensors. The efficiency of low power inductive links is typically less than 1%and is characterised by very unfavourable coupling conditions, which can vary significantly due to coil position and geometry. Although, a considerable volume of knowledge is available on this topic, most of the existing research is focused on the circuital modeling of the transformer action between the external and implanted coils. The practical issues of coil misalignment and orientation and their implications on transmission characteristics of RF links have been overlooked by researchers. The aim of this work is to present a novel analytical model for near-field inductive power transfer incorporating misalignment of the RF coil system. In this thesis the influence of coil orientation, position and geometry on the link efficiency is studied by approaching the problem from an electromagnetic perspective. In implanted devices some degree of misalignment is inevitable between external and implanted coils due to anatomical requirements. First two types of realistic misalignments are studied; a lateral displacement of the coils and an angular misalignment described as a tilt of the receiver coil. A loosely coupled system approximation is adopted since, for the coil dimensions and orientations envisaged, the mutual inductance between the transmitter and receiver coils can be neglected. Following this, formulae are derived for the magnetic field at the implanted coil when it is laterally and angularly misaligned from the external coil and a new power transfer function presented. The magnetic field solution is carried out for a number of practical antenna coil geometries currently popular in RFID and biomedical domains, such as planar and printed square, and circular spirals as well as conventional air-cored and ferromagnetic solenoids. In the second phase of this thesis, the results from the electromagnetic modeling are embodied in a near-field loosely coupled equivalent circuit for the inductive link. This allows us to introduce a power transfer formula incorporating for the first time coil characteristics and misalignment factors. This novel power transfer function allows a comparison between different coil structures such as short solenoids, with air or ferromagnetic core, planar and printed spirals with respect to power delivered at the receiver and its relative position to the transmitter. In the final stage of this work, the experimental verification of the model shows close agreement with the theoretical predictions. Using this analysis a formal design procedure is suggested that can be applied on a larger scale compared to existing methods. The main advantage of this technique is that it can be applied to a wide range of implementations without the limitations imposed by numerical modeling and existing circuital methods. Consequently, the designer has the flexibility to identify the optimum coil geometry for maximum power transfer and misalignment tolerance that suit the specifications of the application considered. This thesis concludes by suggesting a new optimisation technique for maximum power transfer with respect to read range, coil orientation, geometry and operating frequency. Finally, the limitations of this model are reiterated and possible future development of this research is discussed.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Leinweber, Lawrence. "Improved Cryptographic Processor Designs for Security in RFID and Other Ubiquitous Systems". Cleveland, Ohio : Case Western Reserve University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1238734353.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Paiva, Jailton Carlos de. "e-Pontos: Uma solu??o embarcada de automa??o comercial aplicada a clubes de fidelidade baseado em tecnologia RFID e esmart card". Universidade Federal do Rio Grande do Norte, 2012. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15440.

Testo completo
Abstract (sommario):
Made available in DSpace on 2014-12-17T14:56:06Z (GMT). No. of bitstreams: 1 JailtonCP_DISSERT.pdf: 2190503 bytes, checksum: ee26df46d54432b596d1d87d4b66b75c (MD5) Previous issue date: 2012-07-27
In practically all vertical markets and in every region of the planet, loyalty marketers have adopted the tactic of recognition and reward to identify, maintain and increase the yield of their customers. Several strategies have been adopted by companies, and the most popular among them is the loyalty program, which displays a loyalty club to manage these rewards. But the problem with loyalty programs is that customer identification and transfer of loyalty points are made in a semiautomatic. Aiming at this, this paper presents a master's embedded business automation solution called e-Points. The goal of e-Points is munir clubs allegiances with fully automated tooling technology to identify customers directly at the point of sales, ensuring greater control over the loyalty of associate members. For this, we developed a hardware platform with embedded system and RFID technology to be used in PCs tenant, a smart card to accumulate points with every purchase and a web server, which will provide services of interest to retailers and customers membership to the club
Em praticamente todos os mercados verticais e em cada regi?o do planeta, os comerciantes de fidelidade adotaram a t?tica de reconhecimento e recompensa para identificar, manter e aumentar o rendimento de seus clientes. V?rias estrat?gias t?m sido adotadas pelas empresas, e a mais popular entre elas ? o programa de fidelidade, que exibe um clube de fidelidade para gerenciar essas recompensas. Mas o problema com os programas de fidelidade ? que a identifica??o dos clientes e a transmiss?o dos pontos de fidelidade s?o feitas de forma semiautom?tica. Visando isto, o presente trabalho de mestrado apresenta uma solu??o embarcada de automa??o comercial intitulada e-Pontos. O objetivo do e-Pontos ? munir os clubes de fidelidades com ferramental tecnol?gico totalmente automatizado para identificar os clientes diretamente nos pontos de vendas, garantindo um maior controle dos pontos de fidelidade dos membros associados. Para isso, foi desenvolvida uma plataforma de hardware com sistema embarcado e tecnologia RFID que ser? utilizada nos PCs dos lojistas, um smart card para acumular os pontos a cada compra e um servidor web, o qual disponibilizar? servi?os de interesse para os lojistas e os clientes conveniado ao clube
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Spadazzi, Gianluca. "Middleware per Internet of Things: Java Embedded come caso di studio". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7865/.

Testo completo
Abstract (sommario):
Grazie al progresso dell'elettronica, ai giorni nostri, è possibile costruire dispositivi elettronici molto piccoli, che col passare del tempo lo sono sempre più. Questo ci permette di poter imboccare nuove strade nel mondo dell'informatica, sfruttando proprio questo fatto. Le dimensioni ridotte dei dispositivi in commercio, come sensori, attuatori, tag e tanto altro, sono particolarmente adatte a nuovi scenari applicativi. Internet of Things è una visione in cui Internet viene esteso alle cose. Facendo largo uso di dispositivi come sensori e tag è possibile realizzare sistemi intelligenti che possono avere riscontri positivi nella vita di tutti i giorni. Tracciare la posizione degli oggetti, monitorare pazienti da remoto, rilevare dati sull'ambiente per realizzare sistemi automatici (ad esempio regolare automaticamente la luce o la temperatura di una stanza) sono solo alcuni esempi. Internet of Things è la naturale evoluzione di Internet, ed è destinato a cambiare radicalmente la nostra vita futura, poichè la tecnologia sarà sempre più parte integrante della nostra vita, aumentando sempre più il nostro benessere e riducendo sempre più il numero delle azioni quotidiane da compiere. Sempre più sono middleware, le piattaforme e i sistemi operativi che nascono per cercare di eliminare o ridurre le problematiche relative allo sviluppo di sistemi di questo genere, e lo scopo di questa tesi è proprio sottolinearne l'importanza e di analizzare gli aspetti che questi middleware devono affrontare. La tesi è strutturata in questo modo: nel capitolo uno verrà fatta una introduzione a Internet of Things, analizzando alcuni degli innumerevoli scenari applicativi che ne derivano, insieme però alle inevitabili problematiche di tipo tecnologico e sociale. Nel secondo capitolo verranno illustrate le tecnologie abilitanti di Internet of Things, grazie alle quali è possibile realizzare sistemi intelligenti. Nel terzo capitolo verranno analizzati gli aspetti relativi ai middleware, sottolineandone l'importanza e prestando attenzione alle funzioni che devono svolgere, il tutto riportando anche degli esempi di middleware esistenti. Nel quarto capitolo verrà approfondito il middleware Java Embedded di Oracle.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Vitale, Clemente. "Internet of Things". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3184/.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Doan, Xuan Tien. "Multivariate data analysis for embedded sensor networks within the perishable goods supply chain". Thesis, University of Manchester, 2011. https://www.research.manchester.ac.uk/portal/en/theses/multivariate-data-analysis-for-embedded-sensor-networks-within-the-perishable-goods-supply-chain(0b555420-442b-4787-b730-8acf95878996).html.

Testo completo
Abstract (sommario):
This study was aimed at exploring data analysis techniques for generating accurate estimates of the loss in quality of fresh fruits, vegetables and cut flowers in chilled supply chains based on data from advanced sensors. It was motivated by the recent interest in the application of advanced sensors, by emerging concepts in quality controlled logistics, and by the desire to minimise quality losses during transport and storage of the produce. Cut roses were used in this work although the findings will also be applicable to other produce. The literature has reported that whilst temperature was considered to be the most critical post-harvest factor, others such as growing conditions could also be important in the senescence of cut roses. Kinetic modelling was the most commonly used modelling approach for shelf life predictions of foods and perishable produce, but not for estimating vase life (VL) of cut flowers, and so this was explored in this work along with multiple linear regression (MLR) and partial least squares (PLS). As the senescence of cut roses is not fully understood, kinetic modelling could not be implemented directly. Consequently, a novel technique, called Kinetic Linear System (KLS), was developed based on kinetic modelling principles. Simulation studies of shelf life predictions for tomatoes, mushrooms, seasoned soybean sprouts, cooked shrimps and other seafood products showed that the KLS models could effectively replace the kinetic ones. With respect to VL predictions KLS, PLS and MLR were investigated for data analysis from an in-house experiment with cut roses from Cookes Rose Farm (Jersey). The analysis concluded that when the initial and final VLs were available for model calibration, effective estimates of the post-harvest loss in VL of cut roses could be obtained using the post-harvest temperature. Otherwise, when the initial VLs were not available, such effective estimates could not be obtained. Moreover, pre-harvest conditions were shown to correlate with the VL loss but the correlation was too weak to produce or improve an effective estimate of the loss. The results showed that KLS performance was the best while PLS one could be acceptable; but MLR performance was not adequate. In another experiment, boxes of cut roses were transported from a Kenyan farm to a UK distribution centre. Using KLS and PLS techniques, the analysis showed that the growing temperature could be used to obtain effective estimates of the VLs at the farm, at the distribution centre and also the in-transit loss. Further, using post-harvest temperature would lead to a smaller error for the VL at the distribution centre and the VL loss. Nevertheless, the estimates of the VL loss may not be useful practically due to the excessive relative prediction error. Overall, although PLS had a slightly smaller prediction error, KLS worked effectively in many cases where PLS failed, it could handle constraints while PLS could not.In conclusion, KLS and PLS can be used to generate effective estimates of the post-harvest VL loss of cut roses based on post-harvest temperature stresses recorded by advanced sensors. However, the estimates may not be useful practically due to significant relative errors. Alternatively, pre-harvest temperature could be used although it may lead to slightly higher errors. Although PLS had slightly smaller errors KLS was more robust and flexible. Further work is recommended in the objective evaluations of product quality, alternative non-linear techniques and dynamic decision support system.
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Khan, Muhammad S. "Design and Development of Smart Brain-Machine-Brain Interface (SBMIBI) for Deep Brain Stimulation and Other Biomedical Applications". FIU Digital Commons, 2016. http://digitalcommons.fiu.edu/etd/2724.

Testo completo
Abstract (sommario):
Machine collaboration with the biological body/brain by sending electrical information back and forth is one of the leading research areas in neuro-engineering during the twenty-first century. Hence, Brain-Machine-Brain Interface (BMBI) is a powerful tool for achieving such machine-brain/body collaboration. BMBI generally is a smart device (usually invasive) that can record, store, and analyze neural activities, and generate corresponding responses in the form of electrical pulses to stimulate specific brain regions. The Smart Brain-Machine-Brain-Interface (SBMBI) is a step forward with compared to the traditional BMBI by including smart functions, such as in-electrode local computing capabilities, and availability of cloud connectivity in the system to take the advantage of powerful cloud computation in decision making. In this dissertation work, we designed and developed an innovative form of Smart Brain-Machine-Brain Interface (SBMBI) and studied its feasibility in different biomedical applications. With respect to power management, the SBMBI is a semi-passive platform. The communication module is fully passive—powered by RF harvested energy; whereas, the signal processing core is battery-assisted. The efficiency of the implemented RF energy harvester was measured to be 0.005%. One of potential applications of SBMBI is to configure a Smart Deep-Brain-Stimulator (SDBS) based on the general SBMBI platform. The SDBS consists of brain-implantable smart electrodes and a wireless-connected external controller. The SDBS electrodes operate as completely autonomous electronic implants that are capable of sensing and recording neural activities in real time, performing local processing, and generating arbitrary waveforms for neuro-stimulation. A bidirectional, secure, fully-passive wireless communication backbone was designed and integrated into this smart electrode to maintain contact between the smart electrodes and the controller. The standard EPC-Global protocol has been modified and adopted as the communication protocol in this design. The proposed SDBS, by using a SBMBI platform, was demonstrated and tested through a hardware prototype. Additionally the SBMBI was employed to develop a low-power wireless ECG data acquisition device. This device captures cardiac pulses through a non-invasive magnetic resonance electrode, processes the signal and sends it to the backend computer through the SBMBI interface. Analysis was performed to verify the integrity of received ECG data.
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Akinola, Paul. "Design and Implementation of an IoT Solution for Vehicle Access Control in Residential Environment". Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97047.

Testo completo
Abstract (sommario):
To overcome the hurdles associated with space management and security controls in a housing system, research was projected to study and analyze the necessary factors of accomplishment. Over time, different processes were observed and reviewed to make this a possible deal. Various residents were interviewed on the daily constraints in parking and managing their vehicles within their housing premises. The reported daunting concern was majorly the gate access and personal hunts for the space to keep the individual resident’s cars. Every resident would always have to stop and hoot at the housing gate for the assigned personnel to check and open the gate. While this would waste every resident’s time, the visitors even face more delay often time. Hitherto, car access and parking constraint become a thing of worry that no one would want to engage the housing service anymore. The interest has got dwindled. And to re-awaken the high patronage of the housing system, a gap must be bridged with an immediate solution to space management with a gating system. These were subsequently given a classical thought, while a prototype solution was demonstrated and reviewed with the various residents of some selected housing. This received a high welcoming embracement and was beckoned to be made real by the logical heuristic. At this point, nothing was further considered than using the Internet of things (IoT) technology to implement Vehicular Access Management for the control and integration of intended space provisioning in any housings. Consequently, the number plate of every vehicle becomes the automatic access tag and would be used for security control within the housing location. Vehicles’ numbers would be captured and used to manage the residents passing through the automated gating system. With it, records would be made for all permitted residents and the visitors that own a car. Thus, a proper arrangement would be allotted accordingly, as provisioned by the gating system administrator. However, to allegories the above-proffered solution, this project work is divided into six sections. The introductory section introduces the project rationale, lists the objectives, explores related works, and introduces how IoT and vehicular systems can be merged. The second section delves into these vehicular systems. It introduces the Automatic License Plate Recognition System (ALRP) and the Raspberry Pi and highlights the merits of the Integrated Vehicular Access Security System. Open-CV and machine learning are also introduced. Section three covers the solution design, while section four is the implementation phase. Section five covers the testing and implementation of the solution. The final section summarizes the project. The project successfully models an automated solution for the security of tenants and vehicle users against unauthorized access to residential estates and buildings.
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Skopal, Miroslav. "Univerzální hardwarová platforma podporující operační systém Linux". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218709.

Testo completo
Abstract (sommario):
This thesis deals with the development problems and creating of the multi- purpose hardware platform, which supports operating system Linux. It is focused on the microprocessors using ARM architecture with architecture ARM7, ARM9 and ARM11. The scope of the first part of this thesis was searching the sales of available 32 bit ARM microprocessors. The second part is attended to a particular Mini2440 development kit, its animation and the subsequent development of the kernel drivers for OS Linux platform. One of this thesis details was also the development of my own expansive hardware module and a capacity keypad for a usage with Mini2440 developmental kit.
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Yang, Sheng-ju, e 楊昇儒. "Embedded Indoor Location System Using RFID". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/94235855899430385789.

Testo completo
Abstract (sommario):
碩士
南台科技大學
電子工程系
98
Recently, the radio frequency identification (RFID) is recognized as an important technology to affect the global industry in future. RFID employs the integrated circuit and wireless electronics to store and transmit identification data, it exhibits the inherent properties such as environment robustness, repeatedly read/write, non-contact, read a lot of tags in concurrence, etc. Thus, RFID is the best tool to track and feedback information for commercial products and members. This project employs the technologies of embedded system, wireless Internet networking, dynamic website and MySQL database to realize a RFID system. The proposed RFID system can position someone in somewhere. The overall system includes embedded system, management, and user terminals. These terminals are networked with Internet. The embedded system can automatically read the ID code, capture image, acquire IP address, records data, be network with Internet and transmit files after power is on. The management terminal can accept the networking request from the embedded system terminal to receive files and manage files. Furthermore, it can accept the user terminal to search records, verify data, make statistic, and sort data with MySQL database. The user terminal can log in the management terminal via Internet explorer to adjust the camera attitude, view the real-time image and view the results depicted with tables and figures. In this way, the user terminal can see the real-time conditions related to RFID positioning via Internet explorer. The realized RFID system in this project is applied to restrict someone to somewhere in a company or factory.
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Soares, Inês Lima Amil. "Multi-RFID embedded Ticketing Kernel for MaaS". Master's thesis, 2020. http://hdl.handle.net/10451/48311.

Testo completo
Abstract (sommario):
Trabalho de projeto de mestrado, Engenharia Informática (Engenharia de Software) Universidade de Lisboa, Faculdade de Ciências, 2020
The fast-growing human population is causing an ever-increasing trend of hyper urbanisation and globalisation, along with the popularisation of private cars to commute, which contributes to several environmental and health problems, for instance, high lev els of noise, congestion, and pollution. Hence, most cities are facilitating and enhancing commuting travel, thus, fostering the development of transportation. Today’s urban transport networks are part of the daily lives of millions of people around the world, and in this era of digitalisation, servicising, and cashless economy the public transportation must also readjust. Therefore, contactless bank cards will make it reasonable to travel by public transport. It will be the first time in Portugal that a contactless bank card enables public transport to be accessed, travelled and charged. Such a solution would encourage the contactless debit or credit card to be an alternative to the proprietary transit card, thereby helping to enhance the usability and accessibility of public transport. With the launch of the contactless solution in public transport, a metropolitan area in Portugal will very well integrate a growing list of the world’s major cities such as London, Singapore, Rio de Janeiro and New York. Moreover, new passengers gradually shift from maintaining a private car to the use of public transport means, which allows a diminution on the emission of fuel gases, and a reduction of the global pollution. In addition to that, public transport operators pains also decrease because proprietary cards are handled and managed by financial institutions, enabling the transport agencies to turn their attention to the core of their business, like the multi-modal mass transit and fare calculation. This pioneering project in Portugal involved several stakeholders, including Card4B, Visa, and Unicre. Accordingly, the project aimed to provide an open-loop model with con tactless and post-paid payments to integrate into the existing operation of transportation ticketing. Finally, the developed solution supports contactless transactions, and followed the “Contactless Specifications for Payment Systems”. Successfully, the delivered solution was certified with an EMV Level 3 Certification for both Visa PayWave and MasterCard Contactless transactions.
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Lin, Guang-Ming, e 林廣銘. "RFID embedded dental prosthesis for the use of identification". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/hh58x5.

Testo completo
Abstract (sommario):
碩士
國立臺北科技大學
機電整合研究所
101
This thesis provides an effective method of identification by combining RFID technology with dental prostheses. The antenna minimum size we design is 0.8 cm x 1.25 cm currently and its effective distance is 2 cm. The antenna position is lower bilateral first molar region cheek area and the wafer surface parallel to the teeth surface. Redesign shape and size of the prostheses through tag antenna in order to make tag integrate with prostheses tightly. The data can be read by tag through cheek tissue. On one hand, we consider external moisture considerations and required distance, using high frequency (13.56 MHz) as the reader’s and tag’s working band. On the other hand, we chose to use polymeric dental prostheses to avoid metal shielding effect during work. The tag antenna design method is based on antenna inductance, capacitance of resonance inside the wafer and the reader itself magnetic field strength. In addition, we use Comsol Multiphysics to simulate magnetic field strength. Simulated and experimental results is workable. Moreover, this study can apply to identify unknown victims of disaster and assist Alzheimer''s patients who keep short-term memory and lose their ways easily. If this study could combine with EHR in the future, it will help identification work faster.
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Chen, Wun-sheng, e 陳文昇. "A RFID-based Information Service Platform - Implementation on Embedded Linux System". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/btvx6a.

Testo completo
Abstract (sommario):
碩士
國立中央大學
資訊工程研究所
97
Traditionally, forestry and resource conservation needs staff member to inspect and collect data personally, and then bring the information back to workstation for updating database. However, the traditional practices needs staff member to inspect personally, it is waste of manpower and time. Also, most important of all, the staff member in the workstation cannot reflect on-the-spot, if the tree was felled illegally. Moreover, it simplifies workflow by introducing the RFID technology. Therefore, construct a RFID Information Service Platform which based on the RFID technology, allows user to stay in the office and monitor the remote forest over the network. On the other hand, the inspection staff member can easily add to the system by using PDA, cell phone or even notebook which supports WiFi wireless network technology, instead of using specific portable reader. In this study, the forest divided into many regions, each region contains a reader and many RFID tags. Also, each reader connects a wireless access point which allows inspection staff member to adjust the system through wireless network. The primary stages of system construction, all the RFID tags will be attached with location information. Thus, staff member from workstation will be able to report information includes the best location of each reader, in order to get the best results. The system contains three components, including RFID hardware device, back-end server and the mobile software platform for inspection staff. RFID hardware device is the fundamental of this system for identification of various objects. The server is a repository of RFID system which keeps the attribute of all tags. Inspection staff member can download the attribute of tag and reader and the maps of current area. The main goal of this paper is design and implement software platform for inspection staff member, and it is based on the embedded Linux. The mobile platform provides function such as display map, GPS service, RFID device management, task management and synchronization with server.
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Chueh, Sheng-Che, e 闕聖哲. "A Miniaturized Antenna for UHF RFID Tag Embedded in a PCB". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/85319996642229711089.

Testo completo
Abstract (sommario):
碩士
國立交通大學
電信工程研究所
101
RFID tags embedded in a printed circuit board (PCB) have to feed themself into a limited space due to the preexisting onboard circuit elements, and for practical applications these tags have to support at least one meter reading distance. This paper employs multi-layer structure and proposes the concepts of the combination of LC resonance and energy coupling. This can effectively reduce the antenna area. In addition, this work also makes a comparison between the two kinds of LC resonators, the split ring resonator and the planar spiral resonant. The antennas presented in this paper are both implemented by the two-layer structure with the FR-4 substrate of the thickness 0.6 mm. The winding loop, on the top layer, is used for the complex-conjugate match and coupling the energy to the bottom layer to achieve RFID tag antenna size reduction purposes. While in the bottom layer the capacitance of LC resonator realized by the SRR is enhanced by adding the inter-digital capacitor tree structure at the gap of split ring. On the other hand, the planar spiral-type LC resonance in the bottom layer is present by the spiral inductance and the capacitance between the lines. The antenna radiates from the long strip which is connected directly to the spiral resonator. The proposed antenna is designed for RFID application, 922MHz~928MHz, and it occupies the footprint of 50 mm2 and has perfect complex-conjugate match. Moreover, the reading distance can still support one meter long. Therefore, this RFID tag proposed here is suitable for practical applications.
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Lin, Chia-Ti, e 林佳迪. "A Novel Miniaturized Antenna for RFID Tag Embedded in a PCB". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/40684028704207018485.

Testo completo
Abstract (sommario):
碩士
國立交通大學
電信工程研究所
99
This thesis presents an electrically small (ka<0.2) tag antenna(ESA), which is designed as a zeroth-order resonator (ZOR) with a two-layer structure of copper. It is also easily integrated with a PCB (Printed Circuited Board). To enhance the radiation efficiency of the small antenna, mechanism of negative permeability is implemented to keep induced current of the feeding and radiation parts to have the same direction. Furthermore, the mutual coupling between the feeding and radiation parts increases due to a spiral structure of the radiation part, which increases the efficiency. The  simulated result demonstrates good impedance matching in the frequency range of 902~928 MHz. Although the antenna volume is quite small and is of 20 × 5 × 0.8 mm^3 , the measured read range is long and reaches 5.2 meters. The design details for the proposed antenna are described, and the experimental results of the antenna performances are presented and discussed.
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Jian-Yi, Wu, e 吳建毅. "An RFID Data Accessing System With Embedded Devices For Multiple Communication Protocols". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/73679522435439168371.

Testo completo
Abstract (sommario):
碩士
南台科技大學
電機工程系
98
Nowadays, there are many wireless applications using different communication protocols. This article tries to integrate these wireless protocols in an application. P2P (Point to point) communication mechanism is adopted to traverse data across different wireless protocols. In the prototype, we use an industrial embedded wireless handset to initiate and send data to the destination, relaying through a couple of different wireless protocols according to the local environment. The application can be utilized in fields such as storehouse management, physical distribution management and other marketing management, which use wireless handset, HF RFID reader and Bar Code reader very often. The embedded wireless handset already embeds a few wireless protocols, i.e. Bluetooth and Wi-Fi, which are used to access and transmit the source data. With the benefits of Ad-Hoc network, communication can proceed without support of telecom base stations. It is useful in situations like military applications, rescue activities on disasters and some other intelligent communications. Users communicating each other are very possible without support of access points providing by ISP. In the implementation, the industrial handset and a PDA cellular phone act as devices of data accessing. The accessed data are then relaying among Bluetooth and Wi-Fi devices, and finally arriving to a PC server for management of the data.
Gli stili APA, Harvard, Vancouver, ISO e altri
21

陳羿亨. "Embedded RFID and GPRS System and Its Application to Library Management System". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/02742571724897970506.

Testo completo
Abstract (sommario):
碩士
明新科技大學
系統晶片與嵌入式系統產業研發研究所
98
This thesis embedded Radio Frequency Identification (RFID) system and General Packet Radio Service (GPRS) system with the applications to the management of library automation. In the past, the system of borrowing or returning books in libraries was managed by barcode and the information of readers or books was managed by database system in computer servers. However, barcode system has some drawbacks including easy damage, reading one data each time, and spending a lot of time and manpower to search books, inventory book collections, and replace barcode tags. Usually, readers needed the help of library’s personnel to fulfill process of borrowing, reserving or returning books and readers were reminded to reserve or return books by e-mail. But not everyone checks new e-mail in time and often one may miss the right time of reserving or returning books. Therefore, how to use the applicable technologies to improve efficiency and service quality with finite resources is the major topic in library automation. In recent years, the progress of RFID technology makes RFID chip cost down and more applications on RFID are available. The RFID tag is getting to substitute the barcode. Consequently, the RFID system can be applied to library management system. Using Global System Mobile Communication (GSM) message service of GPRS in library management system, the readers can be informed immediately when the date of borrowing or reserving books is due. The GSM message service system can send any information to the readers in time and therefore readers will not miss any opportunity of borrowing or reserving books. With embedding RFID system and GPRS system into the management of library automation, readers can borrow and return books simply and quickly by the automatic identification of RFID system and the information of returning or reserving books can be sent to the readers in time by GPRS system. Therefore, the library automation can be fulfilled to improve efficiency and service quality without additional manpower by the proposed technology of embedded RFID and GPRS systems. Keywords: RFID, GPRS, embedded system, library management, library automation.
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Liu, Mu-Ching, e 劉沐青. "Study of High-Priced Products Embedded RFID Using AES Cryptology to Prevent Counterfeiting". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/39922164066733749177.

Testo completo
Abstract (sommario):
碩士
健行科技大學
資訊工程系碩士班
104
Now many nations have cause huge economic loss because forgery. In fact Taiwan was counterfeit country before. Because more and more counterfeit, it not only cause economic cause but also produce health and safety problem. Security has become an important issue in Taiwan. We propose a research by AES embed into RFID on high-priced commodity to prevent counterfeiting. We use RFID Tag、RFID Reader、Advanced Encryption Standard Cryptography、Sever、MYSQL in the research. And propose security strategy. When you want to buy a product, you need to go to counters. Attendant will read RFID and use Advanced Encryption Standard Cryptography. Consumer data will be encrypted and written into RFID. When you want to sell the product you need to go to Counters. Attendant will read RFID and use Advanced Encryption Standard Cryptography. Consumer data will be decrypted and the new Consumer data will be written in RFID. Information the research will improve Security and counterfeit problem cause our research.
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Lin, Song-Jer, e 林嵩哲. "Applications of RFID and Embedded System to the Inspections on Substations and Manholes". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/9m626p.

Testo completo
Abstract (sommario):
碩士
國立臺北科技大學
電機工程系研究所
95
In order to improve the operational inspection procedure of the transformer system and the distribution system for TPC (Taiwan Power Company) and propose an effective solution, RFID (Radio Frequency Identification) technology and Embedded system are applied and studied in this paper. The secondary substations facility inspection management system and the manhole inspection localization system are also implemented into confirmation system to monitor equipment and the underground feeder for examine the validity of application.
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Chao, Che-Ting, e 趙哲霆. "A design of innovative C2C platform toward story marketing for Objects with embedded RFID". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/4t3w7f.

Testo completo
Abstract (sommario):
碩士
國立中興大學
資訊科學與工程學系
103
Nowadays, most products always need its warranty when they are sold. Traditional paper-based warranty have many problems such as easily be lost and counterfeit. Our laboratory combined technology of RFID and information security technology of PKI to design an innovative, useful and high safety system. This system is called E-Warranty. But E-Warranty only be used when customs buy products or products need to be repaired. We provide more service and application of E-Warranty to let manufacturers and customs will want to use E-Warranty. In this paper, RFID Tag can be treated as electronic-based Warranty that is embedded in products. This design makes physical products to achieve greater value and service by exchanging data on the Internet. We designed a system can let owner to write stories related their things and shared those stories on the Internet. These objects can be contributed to C2C online transaction because of its own stories. We developed an innovative Business Model of C2C online shopping platform. we make the product, the story and author with extremely connectivity for achieving non-repudiation and Unforgeability by using the technology of PKI.
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Chen, Jia-Long, e 陳嘉龍. "Multimedia Control System on Embedded System and RFID Roll Call System with Infrared Remote Control". Thesis, 2008. http://ndltd.ncl.edu.tw/handle/24962925048364122883.

Testo completo
Abstract (sommario):
碩士
國立臺灣科技大學
電子工程系
96
The applications of Embedded System on the consumer electronics are more and more common and popular. The operation interface and operation system are required to be easy understood and familiar and can such that make users more convenience to handle it. Easy programming to integrate on high-level application is another feature. When the system is becoming more complicated, easily to use single chip control solution is not to be workable any more due to its limited memory capacity, poor performance and slow operating speed. The alternation aims to the Embedded System with much sophisticated functionality and friendly used interface such as LCD and “soft-button” touch panel on Embedded System. The thesis use the Embedded System to control the Multimedia Control System, and transmit the command by the simple RS-232 interface, make Multimedia Control System switch the video and audio, projector on and off, electric screen up and down, the volume control of microphone and voice, with Infrared remote control, and combine the RFID Roll Call System to fulfill to the multi-function purpose.
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Singh, Kaumudi. "Addressing Energy and Performance Related Challenges in Networked Embedded Systems". Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5229.

Testo completo
Abstract (sommario):
Networked Embedded Systems comprise of spatially and functionally distributed nodes that are interconnected with one another and with the environment to achieve certain goals. The nodes are connected to one another through wired or wireless communication technologies. This thesis focuses on wireless networks and the challenges encountered in such systems. A node in a wireless network is usually energy-constrained, irrespective of its power source. Hence, schemes that judiciously utilize the energy available at a node to power its peripherals and execute various operations without any performance degradation are required. We have devised energy efficient schemes for data management, accessing network resources, and rendering location based services in a network. A sensor node in a network samples a parameter of interest, followed by transmitting the samples to an aggregator. We have devised an adaptive sampling algorithm that adapts the rate and resolution at which the parameter is sampled based on available energy and its characteristics. Furthermore, we have devised energy and data value-aware algorithms that encourage the selective transmission of data such that fidelity of data recovery is not adversely affected. These schemes not only improve energy utilization but also reduce traffic generated by a node in the network. Before data can be transmitted, nodes are required to perform handshakes on the control channel so that they can access resources for data transmission. The energy consumed while performing these handshakes is often not examined as most of the handshakes are performed only a limited number of times. However, delays in these handshakes affect the ensuing data transmission. To this effect, we have proposed a \Device Registration" algorithm that provides quick access to the Contention Free Period (CFP) resources in the beacon-enabled mode of IEEE 802.15.4 technology. The algorithm can be implemented with minor modi cations to the parameters of the standard and allows the nodes to transmit their data promptly. We have also studied IEEE 802.15.4e-TSCH technology and proposed a \Sparse Beacon Advertisement" algorithm for beacon scheduling so that nodes can join a network in quick time, even when very few beacons are being advertised in the network. Both these schemes not only promote fast access to network resources but also reduce the energy consumed by nodes in accessing these resources. Finally, we have studied the performance of location-based services when applied to asset localization in a space-constrained environment. Radio Frequency Identi cation (RFID) technology has been studied for localization due to its batteryless operation. We have constructed two different reader-antenna setups for tag interrogation and have employed these setups to track and localize assets in different scenarios. We have studied the effect of tag orientation and placements on the measurements collected from the tags and have utilized the fi ndings to track fi rst responders in a corridor. We have also devised methods to localize the tags with sufficient accuracy in scenarios where we collect sparse tag data. We observed that the accuracy of localization depends signi ficantly on the quality as well as the quantity of tag reads. Next, we have addressed the localization of life safety vests, which are equipped with RFID tags, in an aircraft and have devised mechanisms to obtain accurate 2D location information of all the vests present in the aircraft.
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Salajegheh, Mastooreh. "Software Techniques to Reduce the Energy Consumption of Low-Power Devices at the Limits of Digital Abstractions". 2013. https://scholarworks.umass.edu/open_access_dissertations/704.

Testo completo
Abstract (sommario):
My thesis explores the effectiveness of software techniques that bend digital abstractions in order to allow embedded systems to do more with less energy. Recent years have witnessed a proliferation of low-power embedded devices with power ranges of few milliwatts to microwatts. The capabilities and size of the embedded systems continue to improve dramatically; however, improvements in battery density and energy harvesting have failed to mimic a Moore's law. Thus, energy remains a formidable bottleneck for low-power embedded systems. Instead of trying to create hardware with ideal energy proportionality, my dissertation evaluates how to use unconventional and probabilistic computing that bends traditional abstractions and interfaces in order to reduce energy consumption while protecting program semantics. My thesis considers four methods that unleash energy otherwise squandered on communication, storage, time keeping, or sensing: 1) CCCP, which provides an energy-efficient storage alternative to local non-volatile storage by relying on cryptographic backscatter radio communication, 2) Half-Wits, which reduces energy consumption by 30% by allowing operation of embedded systems at below-spec supply voltages and implementing NOR flash memory error recovery in firmware rather than strictly in hardware, 3) TARDIS, which exploits the decay properties of SRAM to estimate the duration of a power failure ranging from seconds to several hours depending on hardware parameters, and 4) Nonsensors, which allow operation of analog to digital converters at low voltages without any hardware modifications to the existing circuitry.
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Todd, Michael Gordon. "Hardware Emulation of a Secure Passive Rfid Sensor System". 2010. https://scholarworks.umass.edu/theses/528.

Testo completo
Abstract (sommario):
Passively powered radio frequency (RFID) tags are a class of devices powered via harvested ultra high frequency (UHF) radiation emitted by a reader device. Currently, these devices are relegated to little more than a form of wireless barcode, but could be used in a myriad of applications from simple product identification to more complex applications such as environmental sensing. Because these devices are intended for large scale deployment and due to the limited power that can be harvested from RF energy, hardware and cost constraints are extremely tight. The Electronic Product Code (EPC) Global Class 1 Generation 2 (Gen2) specification [EPC08] is currently the de facto communication standard for passively powered RFID. One issue restricting deployment and a cause for some privacy concerns is a lack of security in the Gen2 protocol. We will demonstrate a potential solution to this problem by using a novel block cipher designed for low power and area constrained devices to encrypt and transmit sensor data. This will be done while maintaining backward compatibility with the original standard and will require no substantial changes to the reader. Our solution will also provide one way authentication, data integrity checking and will provide security against replay attacks. In this thesis we will demonstrate an FPGA emulation of a Gen2 compatible RFID tag which will serve as a test bed for several novel features. We will leverage prior work involving several aspects of a tag [QL09] [PP07] as well as incorporate a novel low power encryption cipher [AB07] and external temperature sensor. Demonstrated in [CT08], FPGA emulation will allow for the independent verification of several components. This thesis will provide insight into the future of RFID and will provide insight into tag design as well as possible future updates to the Gen2 standard.
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Chang, Wen-Yu, e 張文郁. "The Study on the Optimized Reading Positions of the RFID Chips Embedded into Reeling Cable by Using Six Sigma and the Taguchi method". Thesis, 2019. http://ndltd.ncl.edu.tw/handle/3hn9q5.

Testo completo
Abstract (sommario):
碩士
中原大學
工業與系統工程研究所
107
Wire & Cable have been used to transmit power signal for years in our energy construction. Cable combines with two parts - the inner core consists of a specific number of strands that carry electric signal, and the outer layer jacket is made up of protective insulators. When the temperature of the inner layer rises, it will easy cause cable failure or malfunction. Then it needs engineering staff to remove the cable from device at the scene, which is time-consuming, labor-saving and hard to be prevented. Most of all, this unpredictable damage may result in customer losses and goodwill damage. However, we cannot know the inner heat and damage degrees via observing cable exterior. With the view to understanding the operational status instantly, this research uses cable-embed sensitive RFID chip to read the temperature variety as instant monitor. This application of RFID can find damage in the early stages and replace cable in advance. To pursue more stable product result, accurate and effective process conditions become main key points. This study apply stage systematic architecture of sigma method:define, measure, analyze, improve and control to solve the problems in cable extrusion process. Take Reeling Cable (47.86mm diameter) on as the object of the research, the outcome of RFID cable appears eight essential quality factors. Make use of Taguchi Method, DOE (Design of Experiment), L18 orthogonal table find the best spot for implanting sensitive RFID chip. That lets RFID chip reach the highest optimization of sense molding conditions, makes CPK (Process Capability Index) rise from 0.55 to 1.57 and verify the best process parameters to improve manufacturing yield.
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Wu, Tsung-Hsien, e 吳宗憲. "The Impelementation of Embeded CDI Security System by Using RFID". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/9es29q.

Testo completo
Abstract (sommario):
碩士
國立高雄應用科技大學
電子與資訊工程研究所碩士班
95
The purpose of this dissertation is to provide a convenient and a secure method for preventing that the vehicle was stolen by illegal start. To this end, this dissertation proposes a novel anti-theft mechanism for motorcycles, which the transmission interface is based on RFID (Radio Frequency Identification) technology. The hardware is integrated the RFID device with CDI (Capacitor Discharge Ignition) to control the spark wire so that the defect of general anti-theft device can be improved.To guarantee the security in transferring data, the software decoding approach is based on the KEELOQ® code hopping encoding technique, which differs from the fixed code transmitting method.The ignition authentication procedure enables the CDI function after users insert the legal and registered RFID TAG card. Finally, the contribution of this dissertation is to greatly avoid the occurrence of vehicle stolen by combining the low cost RFID device and CDI function.
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia