The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Following recent advances in sensing and wireless technologies, Internet-of-Things (IoT) applications are being exploited in various fields. The scale of IoT systems and the number of devices that they include has become huge, and the construction of IoT applications is, therefore, becoming increasingly challenging. This work proposes a script framework as a convenient development interface for service-oriented...
In this paper, we proposed an intelligent campus equipment ubiquitous-management system. This RFID-based intelligent ubiquitous-management system use RFID to monitor the status of equipment in real time, and use wire or wireless network to send real-time situation to display on manager's PC or PDA. In addition, the RFID-based intelligent management system will also synchronize with database to record...
In recent years, Internet of Things (IoT) has become the hottest issues of Future Internet. It is the most important concept of Future Internet for providing a common global IT Platform to combine seamless networks and networked things. However, there is a lack of common fabric for integrating IoT with current Internet. That results the service providers and operators have no definite specification...
This article mainly focuses on the application of AES in the radio frequency identification technology. The AES circuit module integrates into radio frequency identification module to increase system front-end identification mechanism. The power analysis at different modes is performed in this work. The concept of data security warning mechanism for RFID tag is demonstrated. The process of the authentication...
In this paper, we study the RFID tag-reader mutual authentication scheme. A hardware design of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards is proposed. The proposed RFID tag-reader mutual authentication protocol was simulated using Modelsim XE II and synthesized using Altera's Quartus II software. The system has been successfully verified in hardware using an Altera...
This work proposes a novel reader deployment mechanism for RFID applications used in daily life activities. Two aspects of the proposed mechanism are discussed: optimizing RFID reader deployment and adjusting reading speed to minimize reader collision. Tabu search strategy is used to find the better locations of deploying readers. Reader deployment performance is analyzed in terms of deployment cost,...
Collision and redundancy problems in RFID system have attracted more and more attention. Collision problems have been studied intensively. However, redundant reader elimination problem is studied only recent years. In this paper, we study the simulation and analysis of algorithm RRE and algorithm TRRE (two-step redundant reader elimination), which are two algorithms used to eliminate redundant reader...
RFID middleware often has to process enormous amounts of data, possibly causing overloading and leading to data errors. Therefore, RFID middleware applications require load-balancing mechanisms. This work proposes a grid-based load-balancing mechanism for RFID middleware applications. The proposed mechanism incorporates functional modules buffer management and load balancing management over a grid...
Technological advances and pervasiveness of the Internet have recently led to the development of diverse technologies for the digital home. This study presents an RFID based interdynamic system with an OSGi platform to support applications for digital home surveillance. In the proposed system, the OSGi platform is called a residential gateway, and it controls and manages the digital home services...
This study proposed integrating Mobile RFID and IPv6 mechanisms, in order for mobile phones to read ID labels on posters, acquire data via mobile network without need of data transmission and conversion by several servers. This mechanism could reduce data transmissions and waiting time of users, and provide the users with more convenient applications. Moreover, the proposed architecture complies with...
To consolidate the balance of sustained generator and diminished maintenance cost in the power plant is one of the most desired goals of a plant administrator. This goal, in fact, can be fulfilled by a proper turbine maintenance policy. This study presented the use of total productive maintenance and the development of turbine prevention maintenance models can enhance the efficiency of equipments...
The EPCglobal is an important standard for RFID. The ONS, which is designed based on the EPCglobal, determines where an EPC is located. Several approaches, such as the EAN.UCC system and DoD identity types, use the EPC. The RFID network designed based on the EPCglobal combines several code systems, including the EPC and an Object Naming System for complete network service. The EPC research currently...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.