The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to the software engineering life cycle and software development process theory, this paper analysis and design mechanical production management system based on Internet of Things, based on the research on actual business process. The paper combining the characteristics of production line analyses the system's functional requirements. Namely, through RFID technology, it manages and controls...
RFID has the potential to enable machines to identify objects, understand their status, and communicate and take action if necessary, to create "real time awareness." Wireless sensor technologies allow objects to provide information about their environment and context, smart technologies allow everyday objects to "think and interact,"; nanotechnology and energy-scavenging technologies...
In recent years, some domestic researchers and manufacturers have reformed outpatient infusion process with mobile computing technology based bar-code technology, RFID technology, wireless networks and mobile terminals, Meanwhile the updated system has been successfully applied in hospital. The paper analysis and research the related literature in domestic, explain the mobile outpatient infusion system...
Food safety and food supply chain management has become a hot research at home and abroad. This article describes the background of the food supply chain, and puts forward a new idea to solve the food safety problems in the food supply chain induced by the causes according to the problem. Analysis based on the quality and safety of the food supply chain information to track state of developments well...
Given the characteristics of the mobile phone market, the development of RFID technology in mobile phones (NFC) could grow quickly and importantly. This paper considers the possible impact of this evolution in term of privacy, and after a few examples, proposes a survey of technology and products of the PC-world intending to offer good privacy characteristics. Then it describes a model and technical...
The aim of modern logistics management is to reduce costs and enhance service standards. Inventory cost is an important component of logistics costs, with the growing market competition and customer demand for multi-frequency, small batch, reduce inventory levels has become a core problem in the modern logistics management with the premise of ensuring customer service. This paper deep analysis the...
As a new identification technology, RFID has extensive application prospects in the field of library. As the RFID in the library lending and management advantages, in recent years, the library at home and abroad began to be widely used. Automatic identification technology with the traditional comparison, RFID has advantages just as scanning quickly, non-contact reading and writing, long service life,...
This paper first introduces a possible evolution of secure personal identification devices, based on RFID technology in the mobiles phones (NFC). Given the characteristics of the mobile phone market, this trend could grow quickly and importantly. This paper considers the possible impact of this evolution in term of privacy, focusing on a typical and important case: payment transactions. This paper...
The pervasiveness of RFID technology raises some issues regarding security and privacy. Untrusted RFID system poses security threat because secret information can be revealed to any adversary platform by unverified applications or components inside the RFID system itself. The unverified applications can be compromised either by any virus or man in the middle attack. In order to strengthen the system...
Recently the problem of providing effective and appropriate healthcare to elderly and disable people is an important field in relative to the aging of population problems. The objective of information and communication technologies (ICT) is to focus on the new technologies the medical environments, so that it can provide management to accelerate and improve the clinical process. Our contribution is...
Modernization of Indian railways has always been a question in focus for the development of the basic infrastructure of our country. Since the railways represent one of the best modes of transport available to the common people, it would be impossible to just keep increasing the fares to meet costs incurred due to maintenance, the large workforce and the expansion activities. The railways should consider...
This paper proposes a systematical approach for redesigning a secure and efficient supply chain. A real international trading case of transporting cargos from an offshore bonded warehouse to a domestic one is used to demonstrate. Through supply chain architecture analysis, system boundaries, interfaces, and value related operands are defined. With System Dynamics analysis, feedback and relations of...
In this paper, an RFID based Electronic Cargo Tracking System (ECTS) for tracking transit container goods in Kenya is discussed. The ECTS system was designed to address the problem of diversion and smuggling of transit goods destined for neighboring countries in East Africa into the Kenyan market. These goods are imported through the port of Mombasa and transported by road or railway through Kenya...
A solution that could contain cattle rustling activities among the cross border communities between Kenya and adjoining areas of Uganda, Sudan, Ethiopia and Somalia is proposed. The region is characterized by nomadic movements of people with their livestock on vast and hostile terrains with inadequate physical and communication infrastructure. The vice has caused havoc to many inhabitants of the region...
RFID technology can potentially be used in many applications. A typical RFID system involves a reader and a number of tags, which may range from the battery-powered tags that have Wi-Fi capabilities, to the low-cost tags that are constrained in computation capacities and hardware resources. Keeping RFID systems secure is crucial since RFID systems are vulnerable to a number of malicious attacks. As...
Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage processes, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information...
In an exhibition, the name card label for each visitor and staff will have an RFID attached in addition to the valuable exhibits. The function is two fold, better services and safety. When provided to the visitors they can be located and accounted for easily and accurately thus enhancing the security. In this paper, RFID technology is applied to an exhibition security and safety system using an algorithm...
Radio frequency identification (RFID) is getting popularity among identification technologies owing to its low cost, light weight, reduced size and inexpensive maintenance. Due to the recognition of RFID in the area of manufacturing, retail, pharmaceuticals and logistics, it is now in consideration for use in many different areas like ubiquitous computing, health care, agriculture, transport and security...
This research has developed a system called Modeling of Tax Installment by RFID (Radio frequency Identification). The technique applies RFID technology to verify and store taxpayer data. It is a tax payment in installments, with tax amount of 3,000 baht or over, both for mid-year and year-end tax. A taxpayer is eligible to ask for a tax payment in 3 equal installments without having to pay any additional...
In a smart hospital that uses RFID technology the location and status of the entities inside the hospital are continuously tracked and are captured into the hospital database. Such a database stores enormous amount of spatial as well as temporal data. Transforming this huge data into actionable information is highly complex. Knowledge discovery in such databases is highly desirable and can be applied...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.