Rfid Tag Research Papers - Academia.edu (original) (raw)

2025

This project explored the lived experiences of three persons with mobility challenges during their quotidian negotiations with their environment in their partially or fully renovated homes. Following them with a video camera, a... more

This project explored the lived experiences of three persons with mobility challenges during their quotidian negotiations with their environment in their partially or fully renovated homes. Following them with a video camera, a documentary film was put together to vividly capture nuanced adaptations they make to achieve an accessible living environment. Their responses to a series of questions exposes the ambivalence associated with their notions and emotions about accessibility. The question central to the film is: what is accessible home for you? Rather than trying to dictate guidelines for architects and builders, the film exposes the audience to the perspectives of people with disabilities that reveal the plurality of their notion of accessibility and the unique challenges associated with striving for it. This project reinforces the inclusive design lesson: one size fits but one; easier achieved in the digital realm, but an equally important goal in the physical realm. Keywords:...

2025, ACM Transactions on Information and System Security

As the number of RFID applications grows, concerns about their security and privacy become greatly amplified. At the same time, the acutely restricted and cost-sensitive nature of RFID tags rules out simple reuse of traditional... more

As the number of RFID applications grows, concerns about their security and privacy become greatly amplified. At the same time, the acutely restricted and cost-sensitive nature of RFID tags rules out simple reuse of traditional security/privacy solutions and calls for a new generation of extremely lightweight identification and authentication protocols. This article describes a universally composable security framework designed especially for RFID applications. We adopt RFID-specific setup, communication, and concurrency assumptions in a model that guarantees strong security, privacy, and availability properties. In particular, the framework supports modular deployment, which is most appropriate for ubiquitous applications. We also describe a set of simple, efficient, secure, and anonymous (untraceable) RFID identification and authentication protocols that instantiate the proposed framework. These protocols involve minimal interaction between tags and readers and place only a small ...

2025, MRS Proceedings

In recent years, there has been tremendous interest in all-printed electronics as a means of achieving ultra-low-cost electronic circuits with uses in displays and disposable electronics applications such as RFID tags. While there have... more

In recent years, there has been tremendous interest in all-printed electronics as a means of achieving ultra-low-cost electronic circuits with uses in displays and disposable electronics applications such as RFID tags. While there have been a few demonstrations of printed organic transistors to date, there has been little work on the associated passive component and interconnection technologies required to enable the development of all-printed RFID circuits. In particular, low-resistance conductors are crucial to achieve the high-Q inductors necessary for RFID. Here, we demonstrate inkjetted nanoparticle-Au conductors on plastic with sheet resistances as low as 0.03 ohms/square. We describe the optimization of the jetting parameters, and their impact on final film morphology and electrical properties. We also demonstrate a bridging technology based on an inkjetted polyimide interlevel dielectric. Using this process, we demonstrate multilevel interconnect and passive component struct...

2025, Lecture Notes in Computer Science

We present WISP, a wireless, battery-free platform for sensing and computation that is powered and read by a standards compliant Ultra-High Frequency (UHF) RFID reader. To the reader, the WISP appears to be an ordinary RFID tag. The WISP... more

We present WISP, a wireless, battery-free platform for sensing and computation that is powered and read by a standards compliant Ultra-High Frequency (UHF) RFID reader. To the reader, the WISP appears to be an ordinary RFID tag. The WISP platform includes a general-purpose programmable flash microcontroller and implements the bi-directional communication primitives required by the Electronic Product Code (EPC) RFID standard, which allows it to communicate arbitrary sensor data via an EPC RFID reader by dynamically changing the ID it presents to the reader. For each 64 bit "packet," the WISP's microcontroller dynamically computes the 16-bit CRC that the EPC standard requires of valid packets. Because the WISP device can control all bits of the presented ID, 64 bits of sensor data can be communicated with a single RFID read event. As an example of the system in operation, we present 13 hours of continuous-valued light-level data measured by the device. All the measurements were made using power harvested from the RFID reader. No battery, and no wired connections (for either power or data) were used. As far as we are aware, this paper reports the first fully programmable computing platform that can operate using power transmitted from a long-range (UHF) RFID reader and communicate arbitrary, multi-bit data in response to a single RFID reader poll event.

2025, IEEE Transactions on Microwave Theory and Techniques

In this paper, a class of high-data-rate battery-free yet active miniature radio-frequency identification tag without any external components (except antenna) operating at millimeter (mm)-wave frequencies is proposed and demonstrated.... more

In this paper, a class of high-data-rate battery-free yet active miniature radio-frequency identification tag without any external components (except antenna) operating at millimeter (mm)-wave frequencies is proposed and demonstrated. This fully embedded tag consists of a recently proposed CMOS-based zero-intermediate-frequency self-oscillating mixer, a high power conversion efficiency mm-wave-to-dc rectifier, and an ultralowpower voltage regulator on a single chip, integrated with ceramicbased antennas. Interconnection between the CMOS die and the antenna is realized using a wire-bonding technique, which is compensated and optimized to match the antenna input impedance and also to minimize the wire-bond associated losses at mm frequencies. The 10 × 10 mm 2 tag wirelessly harvests its energy from an incoming signal at 24 GHz, receives, and recovers the data sent by reader on an amplitude modulation (AM)-modulated 40-GHz carrier, and transmits its data back to the reader on a 40-GHz carrier, using AM modulation as well. The tag exhibits a bit rate of about 500 kb/s during the reader-to-tag communication and 10 Mb/s during the tag-to-reader communication, solely relying on the rectified energy for powering its operation. To the best of our knowledge, such an mm-wave identification tag at mm-wave frequencies has never been reported in the literature.

2025

─ Segmented antennas loaded with reactance elements at the junctions between segments provide additional parameters for shaping antenna characteristics. The design procedure consists of first, circuit analysis of the multiport antenna... more

─ Segmented antennas loaded with reactance elements at the junctions between segments provide additional parameters for shaping antenna characteristics. The design procedure consists of first, circuit analysis of the multiport antenna description to determine the initial values of the lumped element reactances and second, of fine tuning the antenna dimensions full-wave simulation software. Measured results show that a good matching and an omnidirectional radiation pattern in the vertical plane is maintained up to θ = 70o with a circular ground plane of 1m diameter. Index Terms ─ Antenna directivity, antenna impedance matrix, design optimization, omnidirectional antenna, partitioned antenna, printed circuit antenna, segmented antenna.

2025, 2009 IEEE International Conference on RFID

This paper presents a novel method for incorporating a capacitive touch interface into existing passive RFID tag architectures without additional parts or changes to the manufacturing process. Our approach employs the tag's antenna as a... more

This paper presents a novel method for incorporating a capacitive touch interface into existing passive RFID tag architectures without additional parts or changes to the manufacturing process. Our approach employs the tag's antenna as a dual function element in which the antenna simultaneously acts as both a low-frequency capacitive fringing electric field sensor and also as an RF antenna. To demonstrate the feasibility of our approach, we have prototyped a passive UHF tag with capacitive sensing capability integrated into the antenna port using the WISP tag. Finally, we describe how this technology can be used for touch interfaces as well as other applications with the addition of a LED for user feedback.

2025, 2013 IEEE International Conference on RFID (RFID)

After comparing the properties of analog backscatter and digital backscatter, we propose that a combination of the two can provide a solution for high data rate battery free wireless sensing that is superior to either approach on its own.... more

After comparing the properties of analog backscatter and digital backscatter, we propose that a combination of the two can provide a solution for high data rate battery free wireless sensing that is superior to either approach on its own. We present a hybrid analog-digital backscatter platform that uses digital backscatter for addressability and control but switches into analog backscatter mode for high data rate transmission of sensor data. Using hybrid backscatter, we report the first digitally addressable real-time battery free wireless microphone. We develop the hybrid backscatter platform by integrating an electret microphone and RF switch with a digital RFID platform (WISP). The hybrid WISP operates by default in digital mode, transmitting and receiving digital data using the EPC Gen 2 RFID protocol but switching into analog mode to backscatter audio sensor data when activated by Gen 2 READ command. The data is recovered using a USRP-based Software Defined RFID reader. We report an operating range of 7.4 meters for the analog backscatter microphone and 2.7 meters for hybrid microphone with 26.7 dBm output power USRP-based RFID reader.

2025, 2011 IEEE International Conference on RFID

The most significant barrier to improving passive RFID tag performance for both fixed function ID tags and enhanced RFID tags is the limitation on the amount of power that can be harvested for operation. This paper presents a novel... more

The most significant barrier to improving passive RFID tag performance for both fixed function ID tags and enhanced RFID tags is the limitation on the amount of power that can be harvested for operation. This paper presents a novel approach for incorporating solar harvesting capability into existing passive RFID tags without increasing the parts count or changing the tag assembly process. Our approach employs the tag's antenna as a dual function element in which the antenna simultaneously harvests RF energy, communicates with the RFID reader, and harvests solar energy for auxiliary power. This is accomplished by using low cost, printable photovoltaics deposited on flexible substrate to form part of the antenna's radiating structure. Several prototype UHF RFID antennas are demonstrated using commercially available thin film, amorphous solar cells. To quantify the improvement in tag performance, Intel's WISP was used as an initial test vehicle. The effective read range of the tag was increased by six times and exceeded the reader's sensitivity limitations. Additionally, the new antenna allowed for sensing and computing operations to take place independent of the RFID reader under typical office lighting conditions.

2025, IEEE Transactions on Instrumentation and Measurement

2025, Communications of the ACM

The iBracelet and the Wireless Identification and Sensing Platform promise the ability to infer human activity directly from sensor readings.

2025

Abstract—The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the... more

Abstract—The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family. Despite the rich literature regarding the cryptanalysis of these protocols, there are no published results about the impact of fault analysis over them. The purpose of this paper is to fill this gap by presenting a fault analytic method against a prominent member of the HB-family: HB + protocol. We demonstrate that the fault analysis model can lead to a flexible and effective attack against HB-like protocols, posing a serious threat over them. Index Terms—Fault analysis, authentication protocols, HB + protocol, RFID systems. I.

2025, International Journal of Advanced Computer Science and Applications

RFID is now a widespread method used for identifying people and objects. But, not all communication protocols can provide the same rigorous confidentiality to RFID technology. In return, unsafe protocols put individuals and organizations... more

RFID is now a widespread method used for identifying people and objects. But, not all communication protocols can provide the same rigorous confidentiality to RFID technology. In return, unsafe protocols put individuals and organizations into jeopardy. In this paper, a scheme that uses multiple low cost tags for identifying a single object is studied. Through algebraic analysis on chronologically ordered messages, the proposed multi tag arrangement is shown to fail to provide the claimed security. The weaknesses are discussed and previously proven precautions are recommended to increase the security of the protocol, and thus the safety of its users.

2025

The transition from the old economy to the digital economy has been more challenging for some industries than others. One industry that faces many uncommon challenges is the wine industry, which has many risks to buyers and vendors beyond... more

The transition from the old economy to the digital economy has been more challenging for some industries than others. One industry that faces many uncommon challenges is the wine industry, which has many risks to buyers and vendors beyond the ones typically found in E-Business. For example, in the United States many of the laws differ from state to state on what can be shipped from one location to another and from what type of company. Indeed, it is a felony for a winery to ship to some states. There are also legal restrictions around age verification requirements and questions regarding taxes. Taken together this legal ambiguity creates confusion in the supply chain and customer base. In addition the wine industry is far from commoditized. A great deal of variety in taste, quality and selection exists within the industry, which can be difficult for first time online wine buyers of a given product to ascertain without prior experience. This research attempts to study this unique market transition to the digital economy by building on prior research with positive and negative utility factors such as the Technology Acceptance Model (TAM), perceived risk harm and likelihood, trust and related antecedents to purchase intentions.

2025, IEEE Transactions on Microwave Theory and Techniques

This paper studies tag properties for optimized tag-to-reader backscatter communication. The latter is exploited in RF identification (RFID) systems and utilizes binary reflection coefficient change of the tag antenna-load circuit. It is... more

This paper studies tag properties for optimized tag-to-reader backscatter communication. The latter is exploited in RF identification (RFID) systems and utilizes binary reflection coefficient change of the tag antenna-load circuit. It is shown that amplitude maximization of complex reflection coefficient difference between the two states is not sufficient for optimized tag-to-reader backscatter communication, contrary to what is commonly believed in the field. We provide a general tag load selection methodology that applies to any tag antenna, including minimum scattering antennas as a special case. The method is based on tag antenna structural mode closed-form calculation (given three values of tag radar cross section), employs simple antenna/communication theory, and applies to both passive, as well as semipassive RFID tags.

2025

Construction projects generally take place in uncontrolled and unprepared environments where accurate and timely information are vital to operating a well managed and cost efficient construction project. Automated advanced tracking and... more

Construction projects generally take place in uncontrolled and unprepared environments where accurate and timely information are vital to operating a well managed and cost efficient construction project. Automated advanced tracking and data storage technologies such as RFID and GPS give costeffective, unobtrusive and hazard-free solutions for acquiring operations data in the relatively harsh and hectic environment of construction sites. This paper investigates the applications of integrated RF technologies such as RFID and GPS in the management and delivery of construction information. RFID integrated with the GPS provides an opportunity to collect data and to transfer them by GSM technology using minimal or no worker input.

2025

This paper presents a novel inkjet printed rounded corner bowtie antenna with T-matching stubs on paper substrate which is the cheapest and widest available substrate. The antenna exhibits compact size with outstanding read range and... more

This paper presents a novel inkjet printed rounded corner bowtie antenna with T-matching stubs on paper substrate which is the cheapest and widest available substrate. The antenna exhibits compact size with outstanding read range and complete coverage of UHF RFID band (860-960 MHz). The results show extreme immunity of proposed antenna against paper dielectric constant variation.

2025, International Journal of Research in Engineering and Technology

Now-a-days mode of transportation playing a major role in transport related problems. Every day millions of vehicles are passing through roads, mainly in this transport related issues Time, safety and efficiency are the major factors why... more

Now-a-days mode of transportation playing a major role in transport related problems. Every day millions of vehicles are passing through roads, mainly in this transport related issues Time, safety and efficiency are the major factors why because mode of transportation plays an important role in urbanization. Through this paper integrated solution has been offered to the transport related issues based on ARM7. Hence ARM7 is the core which has hardware modules such as RFID,GSM and SPEED SENSOR(split counter) to handle the new transport related problems viz., special zone(school zones, hospital zones, army zones) ,toll gate control, parking slot management and traffic rule violation control are explained in this paper. A professional exploitation of communication link between RF Modems over a wireless channel to facilitate vehicle monitoring, vehicle verification and automated toll collection on highways is proposed

2025

Earth science metadata search engines dealing with large volumes of Earth science metadata need an effective method to respond to queries and retrieve metadata very quickly. Basically, Earth science metadata includes three types of... more

Earth science metadata search engines dealing with large volumes of Earth science metadata need an effective method to respond to queries and retrieve metadata very quickly. Basically, Earth science metadata includes three types of information: descriptive text, temporal range, and spatial range. So, except for the general text retrieval, Earth science metadata retrieval requires a temporal range query and a spatial range query, which are not widely needed by other types of search engines. DIMES, a distributed metadata server, is being tested for use of Lucene to tackle the search problem of Earth science metadata. The vantage points of Lucene are that it is not only a high-performance text search index, but also has a special query type called range query which is especially fit for temporal range and spatial range queries of Earth science metadata once the temporal and spatial information are converted to strings with alphabetic orders. This paper introduces how DIMES applies the Lucene range query for applicable temporal and spatial range searches in the Earth sciences.

2025

Temperature monitoring is important in a number of fields, particularly cold supply chain applications. Most commercial wireless temperature sensors consist of transceivers, memory and batteries to maintain a temperature time history but... more

Temperature monitoring is important in a number of fields, particularly cold supply chain applications. Most commercial wireless temperature sensors consist of transceivers, memory and batteries to maintain a temperature time history but this is expensive and allows for limited sensor deployment. In this paper, we propose a low cost temperature sensor based on the paradigm of passive RFID tag antenna based sensing. A simple mechanical method to permanently induce changes in RFID tag power characteristics upon exposure to temperatures greater than a threshold is presented. Critical temperature threshold violations can then be detected by monitoring received backscatter signal strength at a reader. The feasibility of the proposed hypothesis is examined via theoretical and experimental means. It will be shown that this sensing paradigm has the potential to greatly increase the pervasiveness of temperature sensing nodes and improve supply chain visibility and performance.

2025

The efficiency of cold supply chain operations can be improved with pervasive temperature sensing. In this paper, we investigate the design of a low-cost, single-use RFID based temperature threshold sensor that is capable of relating the... more

The efficiency of cold supply chain operations can be improved with pervasive temperature sensing. In this paper, we investigate the design of a low-cost, single-use RFID based temperature threshold sensor that is capable of relating the violation of a temperature threshold to a shift in the optimal operating frequency at which the tag antenna is well matched to the tag IC. This shift is detectable by commercial UHF RFID readers operating in the 902-928 MHz frequency band. We will illustrate how state change information is preserved using a nonelectric memory mechanism that works even in the absence of reader transmitted power. We demonstrate that the sensor works reliably for a read distance of over 3 m and in noisy environments.

2025

This paper presents a novel communication method for semi-passive RFID based sensors. The new method uses a digitally reconfigurable UHF RFID tag antenna to modulate sensed information at an RFID tag on to the received signal strength... more

This paper presents a novel communication method for semi-passive RFID based sensors. The new method uses a digitally reconfigurable UHF RFID tag antenna to modulate sensed information at an RFID tag on to the received signal strength indicator (RSSI) response perceived at an RFID reader. This technique is completely compatible with the existing class 1 generation 2 UHF air interface protocol thereby enabling the use of existing RFID reader infrastructure to decode the additional sensed information. The effect of read distance, environment and bit duration on the performance of the communication method is examined through measurements obtained from a prototype. Through experimental verification, it is demonstrated that error free transmission of sensor information can be achieved up to 3.5 meters in different environments with a bit duration of 500 ms. Prospective future research directions are also discussed.

2025, IEEE Transactions on Microwave Theory and Techniques

2025

Radio Frequency Identification (RFID)is a device used for the detection of objects such that the data can be monitored at each stage. A RFID device consists of a Tag, a Reader and a Server. The Data read by the Tag device need to be send... more

Radio Frequency Identification (RFID)is a device used for the detection of objects such that the data can be monitored at each stage. A RFID device consists of a Tag, a Reader and a Server. The Data read by the Tag device need to be send wirelessly to the reader. During the transmission of Data from Tag to Reader the chances of eavesdropping and various attacks is possible. So here proposed a new technique of providing authentication between Tag and the Reader to prevent from various attacks and the data is send securely.

2025, Hindawi Publishing Corporation

This paper presents the design of multilayer strip dipole antenna by stacking a flexible copper-clad laminate utilized for curved surface on the cylindrical objects. The designed antenna will reduce the effects of curving based on... more

This paper presents the design of multilayer strip dipole antenna by stacking a flexible copper-clad laminate utilized for curved surface on the cylindrical objects. The designed antenna will reduce the effects of curving based on relative lengths that are changed in each stacking flexible copper-clad laminate layer. Curving is different from each layer of the antenna, so the resonance frequency that resulted from an extended antenna provides better frequency response stability compared to modern antenna when it is curved or attached to cylindrical objects. The frequency of multilayer antenna is designed at 920 MHz for UHF RFID applications.

2025, ipcsit.com

Abstract. There are many computations and surveys which involve confidential data from many parties or organizations. As the concerned data is property of the organization or the party, preservation and security of this data is of prime... more

Abstract. There are many computations and surveys which involve confidential data from many parties or organizations. As the concerned data is property of the organization or the party, preservation and security of this data is of prime importance for such type of computations. Although ...

2025, Journal of Communications

2025, IEEE access

The result was created through solving the student project "Security analysis and developing lightweight ciphers and protocols" using objective oriented support for specific university research from the University of Finance and... more

The result was created through solving the student project "Security analysis and developing lightweight ciphers and protocols" using objective oriented support for specific university research from the University of Finance and Administration, Prague, Czech Republic. Authors thank Michal Merta, and Zdeněk Truhlář for their help with the research connected with the topic of the article.

2025, 2008 Third International Conference on Systems and Networks Communications

This paper describes an innovative and highly secure networking architecture, dedicated to the Internet of Things (IoT). We propose an infrastructure that works with a new type of tags, supporting the recently standardized Host Identity... more

This paper describes an innovative and highly secure networking architecture, dedicated to the Internet of Things (IoT). We propose an infrastructure that works with a new type of tags, supporting the recently standardized Host Identity Protocol (HIP). Our main concern is to ensure RFID tags privacy, while enabling things to things communications.

2025, Auckland University of Technology

This thesis explores how consumer perception of benefits influences their acceptance of item-level Radio Frequency Identification (RFID) technology within the Fast Moving Consumer Goods (FMCG) industry, despite potential privacy concerns.... more

This thesis explores how consumer perception of benefits influences their acceptance of item-level Radio Frequency Identification (RFID) technology within the Fast Moving Consumer Goods (FMCG) industry, despite potential privacy concerns. Expanding on prior research that focused solely on in-store benefits, this study introduces two new categories: in-store and after-sale benefits and risks.

2025, Sustainability

Labels are a crucial component of products, offering informational content and attractive visuals; therefore, the durability of the print is an important quality requirement. On the other hand, in accordance with eco-design, the... more

Labels are a crucial component of products, offering informational content and attractive visuals; therefore, the durability of the print is an important quality requirement. On the other hand, in accordance with eco-design, the recyclability of printed labels is vital. In our research, the focus was on the assessment of the durability, recyclability, and deinkability of printed label paper equipped with printed RFID tags. The determined color fastness of electrophotographic prints affected by various environmental factors showed good resistance to dry rubbing and, in most cases, light and moist-heat treatment, confirming the applicability of digital printing on self-adhesive biodegradable paper labels. In the second part of this study, recyclability was assessed, and a comparison between the deinkability of the offset and digital prints and two conductive functional inks was conducted. Good deinkability was observed for the printed RFID antennas on both the offset and electrographic prints, with only a small deterioration in optical properties, especially when nano-silver conductive ink was used. The study highlights the importance of the selection of materials and printing techniques when considering the environmental impact of printed electronics. The results showed that INGEDE 11 is a suitable deinking method for printed RFID antennas on offset and electrographic prints.

2025, IACR Cryptology ePrint Archive

Hard mathematical problems are at the core of security arguments in cryptography. In this paper, we study mathematical generalizations of the famous Rubik's cube puzzle, namely the factorization, representation and balance problems in... more

Hard mathematical problems are at the core of security arguments in cryptography. In this paper, we study mathematical generalizations of the famous Rubik's cube puzzle, namely the factorization, representation and balance problems in non-Abelian groups. These problems arise naturally when describing the security of Cayley hash functions, a class of cryptographic hash functions with very interesting properties. The factorization problem is also strongly related to a famous long-standing conjecture of Babai, at the intersection of group theory and graph theory. A constructive proof of Babai's conjecture would make all Cayley hash functions insecure, but on the other hand it would have many positive applications in graph theory and computer science. In this paper, we classify existing attacks against Cayley hash functions and we review known results on Babai's conjecture. Despite recent cryptanalytic progress on particular instances, we show that the factorization, representation and balance problems presumably remain good sources of cryptographic hard problems. Our study demonstrates that Cayley hash functions deserve further interest by the cryptography community. Disclaimer. This paper contains essentially no new result but it rather collects and organizes all the results that were independently found by two distinct scientific communities on the same problems. Between September 2009 and May 2010, the first author gave a sequence of talks to a cryptographic audience, entitled "Hash functions and Cayley graphs: the end of the story?". Surprisingly, many cryptographers seemed to either ignore the beautiful Cayley hash construction, or believe that it had been definitively broken. The very positive feedback received after these talks motivated us to write this survey and to complete it with known results on Babai's conjecture.

2025

Ambient Assisted Living environments projects arise as technological responses of the scientific community to problems associated with the populationageing phenomenon. In theory, these environments should allow de-localization of... more

Ambient Assisted Living environments projects arise as technological responses of the scientific community to problems associated with the populationageing phenomenon. In theory, these environments should allow de-localization of healthcare services delivery and management to the home, thus containing the economic and social costs associated with old age. The VirtualECare project is one of those environments, enhanced with proactive techniques for a better user experience, focused on elderly chronic patients, through the ability of constant learning and adaption based in user interaction and its contexts. This learning and, consequently, adaption needs, however, unequivocally user identification, especially in multi-user environments. Traditional identification techniques and methodologies are not suitable for these scenario since, usually, require user interaction and wireless identification technique (e.g. RFID, Bluetooth) are very exposed to personification. In order to obtain the expected results we needed a more advanced technology. One possible, appropriate and already fairly developed technique is Facial Recognition. In this paper we present the VirtualECare project approach to Facial Recognition authentication techniques its advantages, disadvantages and possible implementations paths.

2025, Sensors & Transducers

We have analyzed the implications of innovations in MEMS on Wireless Sensor Networks (WSN) and have modeled MEMS elements from a device prospective. We have commented on the advantages as well as the challenges that exist in this... more

We have analyzed the implications of innovations in MEMS on Wireless Sensor Networks (WSN) and have modeled MEMS elements from a device prospective. We have commented on the advantages as well as the challenges that exist in this technology and described the important factors that need to be kept under consideration for the calculation of the reliability for practical implementation of MEMS based devices and the scope of modeling. We have executed the work on SUGAR of MATLAB; the proposal is then compared to the recent developments taking place and with the other experimental result which are reported. Thus a comprehensive modeling aspect of MEMS based elements of a WSN is shown. Modeling of tunable comb resonators, Vertically-shaped comb-resonators and thermal actuator has been shown and the implication of modeling in such devices has been shown. Various computations were implemented and results being given supporting the data from the experiments in recent years.

2025, 2011 28th National Radio Science Conference (NRSC)

This paper presents a new application of dielectric resonator antenna in radio frequency identification system. A curved dual-band dielectric resonator antenna for RFID applications is proposed. The tag antenna is designed to operate at... more

This paper presents a new application of dielectric resonator antenna in radio frequency identification system. A curved dual-band dielectric resonator antenna for RFID applications is proposed. The tag antenna is designed to operate at 2.45 GHz (2.25-2.55 GHz) and 5.8 GHz (5.65-5.95 GHz) bands. The radiation characteristics of the tag antenna in free space are investigated. The radar cross sections under different loads are obtained. The effect of curvature on the tag antenna performance is explained. Two examples are considered. In the first example, the tag antenna is mounted on cylindrical bottle filled with the Polyethylene material. The effect of the object properties on the radiation characteristics and the radar cross section is investigated. In the second example, the tag antenna is mounted on spherical bottle filled with the Polyethylene material. The radiation and backscattering characteristics are calculated. The Finite Element Method (FEM) is used for simulation and the Finite Integration Technique (FIT) is used to verify the simulated results.

2025, 2015 International Symposium on Agents, Multi-Agent Systems and Robotics (ISAMSR)

This paper describes the verification analysis for agent formal model of behaviour change process. The verification analysis was based on two widely used approaches in agent formal evaluation namely mathematical and automated analysis.... more

This paper describes the verification analysis for agent formal model of behaviour change process. The verification analysis was based on two widely used approaches in agent formal evaluation namely mathematical and automated analysis. The mathematical analysis made use of stability equilibria point while the automated, made use of Temporal Trace Language (TTL). The results obtained verify the formal model validity.

2025, IEEE Transactions on Knowledge and Data Engineering

RFID technology can be applied to a broad range of areas. In particular, RFID is very useful in the area of business, such as supply chain management. However, the amount of RFID data in such an environment is huge. Therefore, much time... more

RFID technology can be applied to a broad range of areas. In particular, RFID is very useful in the area of business, such as supply chain management. However, the amount of RFID data in such an environment is huge. Therefore, much time is needed to extract valuable information from RFID data for supply chain management. In this paper, we present an efficient method to process a massive amount of RFID data for supply chain management. We first define query templates to analyze the supply chain. We then propose an effective path encoding scheme that encodes the flows of products. However, if the flows are long, the numbers in the path encoding scheme that correspond to the flows will be very large. We solve this by providing a method that divides flows. To retrieve the time information for products efficiently, we utilize a numbering scheme for the XML area. Based on the path encoding scheme and the numbering scheme, we devise a storage scheme that can process tracking queries and path oriented queries efficiently on an RDBMS. Finally, we propose a method that translates the queries to SQL queries. Experimental results show that our approach can process the queries efficiently.

2025, Loren Valery Roselee

Sudah punya proyektor keren, tapi kok gambarnya kurang maksimal? Ingin kualitas gambar proyektor nomor satu? Jangan lupakan peran penting layar proyektor! Layar proyektor yang tepat, investasi cerdas untuk pengalaman menonton yang nomor... more

Sudah punya proyektor keren, tapi kok gambarnya kurang maksimal? Ingin kualitas gambar proyektor nomor satu? Jangan lupakan peran penting layar proyektor! Layar proyektor yang tepat, investasi cerdas untuk pengalaman menonton yang nomor satu.

2025, IEEE Antennas and Wireless Propagation Letters

RFID tag design is generally focused specifically on either off-metal or on-metal configurations. In this work passive 2D and 3D RFID tags are presented which perform similarly in both configurations. The tags operate in the ISM RFID UHF... more

RFID tag design is generally focused specifically on either off-metal or on-metal configurations. In this work passive 2D and 3D RFID tags are presented which perform similarly in both configurations. The tags operate in the ISM RFID UHF bands (864-868 MHz and 902-928 MHz). A matching loop consisting of two parallel stubs to ground is used for impedance matching to a passive integrated circuit, which has -18 dBm sensitivity. A planar 2D tag with a footprint of 13126.5 mm 2 is first introduced, showing a simulated gain of approximately 3 dBi and a measured read range of 10 m (for 31 dBm transmit power from the reader) in both on-metal and off-metal conditions. The tag is miniaturized into a 3D geometry with a footprint of 2524.25 mm 2 (520% reduction) and achieves the same broadside simulated on-metal gain. The antennas are fabricated using 3D printed acrylonitrile butadiene styrene (ABS). The conductive layer is realized by micro-dispensing silver paste (Dupont CB028). A meshed ground configuration is explored in order to accomplish a 50% conductive paste reduction without disrupting the performance. The proposed tags are compared with commercially available tags as well as previously published tags in terms of read range and size. The tags in this work present an improvement in terms of read range, gain, and area with respect to previous designs covering the ISM RFID UHF bands. Moreover, the performance of these tags is maintained in on-and off-metal conditions, achieving comparable performance and a reduction in volume of 11482% with respect to the best tag reported. Index Terms-Direct digital manufacturing, read range, onmetal tag, RFID tags, UHF antennas. FID applications continue to increase in number and new uses of the technology have prompted innovative tag design. Achieving smaller tag footprints is of particular importance, motivating the development of 3D designs which make more efficient use of the antenna volume [1, 2]. However, most commercial tag designs that are currently available are optimized for either on-metal or off-metal conditions, and the performance is greatly diminished when the surrounding environment differs from the intended one.

2025, 2006 IEEE Antennas and Propagation Society International Symposium

In this paper, the design and development of a unique high read-range highefficiency (95%) Radio Frequency IDentification (RFID) antenna for the 915 MHZ UHF band is discussed. The RFID exceptional characteristics are investigated in terms... more

In this paper, the design and development of a unique high read-range highefficiency (95%) Radio Frequency IDentification (RFID) antenna for the 915 MHZ UHF band is discussed. The RFID exceptional characteristics are investigated in terms of antenna-IC matching and radiation efficiency. This 915 MHz passive tag is a 3" x 3" omnidirectional tag and yielded a read range of 31 feet compared to a 4" x 4" leading commercial design of 26 feet tested range in lab. This tag also possesses higher read power range (-7dBm to 30 dBm) than the leading commercial design (-5dBm to 30 dBm). The proposed RFID antenna was fabricated on 50.8 micron thick Liquid Crystal Polymer (LCP) and the read range of the proposed RFID tags was experimentally verified.

2025, Computers Helping People with Special Needs

In this paper, we designed and implemented the Blind Interactive Guide System (BIGS) for the blind person to use in the building. The BIGS uses RFID-based indoor positioning system to acquire the current location information of the user.... more

In this paper, we designed and implemented the Blind Interactive Guide System (BIGS) for the blind person to use in the building. The BIGS uses RFID-based indoor positioning system to acquire the current location information of the user. The system consists of two parts: the smart floor and the portable terminal unit. The smart floor is a floor of a building where each tile of the floor has the passive RFID tag which transmits a unique ID number. The portable terminal unit is an embedded system equipped with an RFID reader as an input device so that the BIGS can get the current location information of the user. Using the preinstalled map of the target floor, the blind person can navigate to the final destination. The prototype is implemented and successfully operated.

2025, Proceedings of the Eighth ACM International Workshop on Data Engineering for Wireless and Mobile Access

Casualties in emergency situations are often caused by panic and in cases where building evacuation is required, they are often caused by a disorganized evacuation. This has motivated us to design a two-layer indoor evacuation system that... more

Casualties in emergency situations are often caused by panic and in cases where building evacuation is required, they are often caused by a disorganized evacuation. This has motivated us to design a two-layer indoor evacuation system that takes advantage of two technologies all people carry on them, namely, cellular phones with cameras and RFID cards. The proposed system integrates QR Code and RFID-based positioning with a routing system with mounted terminals and displays for guiding people with RFID tags out of a building. People with mobile devices with cameras use an application that resolves QR codes into web addresses that point to dynamically generated evacuation instructions. As a proofof-concept, we have implemented this system with commercially available tools and components as an e-scaveger hunt game which uses our novel evacuation (routing) algorithm to guide players around a building visiting different locations in a load balancing manner. In this demo, we are planning to deploy this e-scavenger game and the participants would be able to follow the progress of the game (evacuation) through a system monitor dashboard.

2025, 2011 IEEE International Conference on RFID

This paper presents an approach for calibrating backscattering measurements from 860-960 MHz Ultra-High Frequency Radio Frequency Identification (UHF RFID) tags. An Sparameter model is formulated to relate diode switch and antenna input... more

This paper presents an approach for calibrating backscattering measurements from 860-960 MHz Ultra-High Frequency Radio Frequency Identification (UHF RFID) tags. An Sparameter model is formulated to relate diode switch and antenna input circuit parameters with the scattering performance of the calibration device. Measurements of modulated backscattered power agree with the model to within ±0.1 dB. Tag backscatter measurements can then be calibrated by comparing them to the reference signal. In an example testbed, the expanded uncertainty of these measurements is estimated to be ±0.4 dB, compared with uncertainties worse than -0.9 dB, +1.2 dB for methods that calibrate against radar cross section (RCS) standards in the same testbed.

2025, Naksh Solutions

This paper examines various significant symmetric and asymmetric cryptography algorithms and their importance in network security. With the increasing use of the internet, there has been a corresponding rise in attacks on communication... more

This paper examines various significant symmetric and asymmetric cryptography algorithms and their importance in network security. With the increasing use of the internet, there has been a corresponding rise in attacks on communication channels. Such attacks may enable third parties to access sensitive information regarding an organization and its operations. This information could potentially be used to disrupt an organization's activities or to extort payment in exchange for the data. To mitigate these risks, cryptographic algorithms are employed to secure communications. These algorithms encrypt data in a manner that makes it difficult for unauthorized individuals to access, rendering it ineffective for attackers. Consequently, these algorithms are essential to the security of communications. This paper presents a study of symmetric and asymmetric algorithms with respect to optimal resource allocation, potential attacks that may exploit these algorithms, time and power consumption, overall structure, and other relevant factors, along with an explanation of various security attacks.

2025, Computer Standards & Interfaces

2025, 2011 IEEE Sensors Applications Symposium

Purpose -The purpose of this paper is to develop a novel totally passive, wireless temperature sensor tag based on ultra high-frequency (UHF) radio frequency identification (RFID) technology. The temperature-sensing functionality is... more

Purpose -The purpose of this paper is to develop a novel totally passive, wireless temperature sensor tag based on ultra high-frequency (UHF) radio frequency identification (RFID) technology. The temperature-sensing functionality is enabled by using distilled water embedded in the tag antenna substrate. The novel sensor tag is designed to provide wireless temperature readings comparable to a commercial thermocouple thermometer even in environments with high levels of interference, such as reflections. The structure of the novel sensor tag is aimed to increase its usability by minimizing user-created errors and to simplify the measurement procedure. Design/methodology/approach -The sensor tag is based on a dual port sensing concept in which two ports are used to obtain sensor readings. By utilizing two ports instead of one, the effects of environmental interference, tag-reader antenna orientation and distance can be effectively minimized. Two alternative methods of acquiring the sensor reading from the operating characteristics of the two ports are presented and discussed. Findings -Temperature measurements in practical scenarios show that by utilizing the dual port sensing concept, the developed tag produces temperature readings wirelessly which are comparable to readings from a commercial thermocouple thermometer. Research limitations/implications -The concept of dual port sensing was shown and two alternative methods on extracting sensor readings from the differences in the port operating characteristics were introduced and discussed. In this paper, the dual port sensing concept is utilized in creating a temperature sensor tag; however, the same concept can be utilized in a variety of passive wireless sensors based on UHF RFID technology. This enables a new approach in designing accurate, easy to use and easily integrable passive sensors. The dual port sensing concept is in its early stages of development; its accuracy could be improved by developing more advanced data post-processing techniques. Practical implications -The accuracy of a passive dual port UHF RFID-enabled temperature sensor tag is proven to be sufficient in many applications. This indicates that other sensor types utilizing the dual port sensing concept can reach high levels of accuracy as well. Furthermore, the passive RFID-enabled sensors based on the dual port sensing concept are superior in usability versus sensor tags equipped only with a single port. Therefore, dual port sensing concept in passive UHF RFID-enabled sensor tags could make such sensors more attractive commercially and lead to truly widespread ubiquitous sensing and computing. Originality/value -This paper presents a novel passive, wireless temperature sensor tag for UHF RFID systems. The sensor tag utilizes a new structure which allows tight integration of two ports and two tag antennas. The accuracy of the developed tag is confirmed throughout measurements and it is found comparable to the accuracy of commercial thermometers in practical measurement scenarios. Moreover, the paper presents a dual port sensing concept and two readout methods based on the concept which are aimed to increase the accuracy and usability of all kinds of UHF RFID-enabled sensor tags.

2025

Radio frequency identification( RFID) is unwired processing task uses the radio signals for communication purpose. By using radio signals RFID pointing out the objects with unique electronic product code. This electronic product code... more

Radio frequency identification( RFID) is unwired processing task uses the radio signals for communication purpose. By using radio signals RFID pointing out the objects with unique electronic product code. This electronic product code hiving unique identification for single-single objects. The main disadvantages of RFID is, leaking the information as distance increases. As distances increases unsecured authentication start between the tag and reader. At this time unauthorized user may get all the information of the object and as well as unauthorized user may guess the password also. Hence unsecured authentication may generate some security problems and secret-privacy protection problems to the authorized user. EPC Class-1 generation-2 technique generates to many security issues hence to overcome these problems we proposing new pad generation technique instead of EPC Class-1 generation-2 technique. By doing this we producing strong authentication between tag and reader. In this paper ...

2025, IEEE Transactions on Microwave Theory and Techniques

Kurokawa's method of calculating the power reflection coefficient from the Smith chart in the situation when one complex impedance is directly connected to another is applied to passive RFID tag design, where power reflection is... more

Kurokawa's method of calculating the power reflection coefficient from the Smith chart in the situation when one complex impedance is directly connected to another is applied to passive RFID tag design, where power reflection is important, as it determines the tag characteristics. The performance analysis of a specific RFID tag is presented together with experimental data, which is in close agreement with the theory.

2025, IEEE Transactions on Antennas and Propagation