• No results found

Recognition model of the mobile RFID systems

Mobile Applications for RFID Based B2B Systems

Mobile Applications for RFID Based B2B Systems

... The RFID_B2B system refers to the business relations in large enterprises, corporations and groups, as regards the control of the materials along their entire supply chain. The system proposes applying the RFID ...

13

A Secure and Efficient Authentication Protocol for Mobile RFID Systems

A Secure and Efficient Authentication Protocol for Mobile RFID Systems

... (RFID) systems has been exten- sively studied in recent years in view of the awareness of individual privacy and the requirement of robust system ...an RFID reader and its backend server is secure ...

7

Privacy-Preserving  RFID  Systems:  Model   and  Constructions

Privacy-Preserving RFID Systems: Model and Constructions

... Each line of Inst are referenced by an instance identifier and contains all the messages exchanged by both entity (reader and tag), and the result of the protocol. As described here, this table can be seen as an historic ...

32

Mobile RFID solutions

Mobile RFID solutions

... as mobile field force applications allow for always-available, offline capabilities, RFID solutions involving mobile devices should not depend on a constant connection between the device and ...the ...

5

Mobile communication / Telematics / RFID

Mobile communication / Telematics / RFID

... Main problems to solve………. Today: • Disconnection of physical and information flow • Assumption of connectivity of all players in the SC • Lack of automatic data capture in most systems • Proliferation of ...

18

A hybrid model of sentimental entity recognition on mobile social media

A hybrid model of sentimental entity recognition on mobile social media

... Abstract With new forms of media such as Twitter becoming increasingly popular, the Internet is now the main conduit of individual and interpersonal messages. A considerable amount of people express their personal ...

12

RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management

RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management

... implantable RFID chips could also someday have medical applications. 2.1 Threat Model Despite the utility of RFID automation, not everyone is happy with the prolifera- tion of RFID ...

11

Adaptive systems for hidden Markov model-based pattern recognition systems

Adaptive systems for hidden Markov model-based pattern recognition systems

... LoGID is used in an incremental learning setting, and its parameters are computed by taking into account only the first block of data a very small training set, and so it is not easy to c[r] ...

156

RFID Technology for Mobile Robot Surveillance

RFID Technology for Mobile Robot Surveillance

... fuzzy model of the RFID system, which describes the detection range of an antenna, as its distance and orientation relative to the tags ...this model, we develop two algorithms that allow a ...

22

Mobile RFID Applications and Security Challenges

Mobile RFID Applications and Security Challenges

... Trust Model: There would be many competitive service providers selling location-based services to ...user’s mobile phone may need to communicate with many service provider’s Information ...resource-poor ...

12

A Steady Change From RFID To Facial Recognition

A Steady Change From RFID To Facial Recognition

... detection model but limited time and resources prevented us from doing ...facial recognition system will learn to recognize individuals with good accuracy but with time, as people age, the dataset will get ...

7

Model checking of mobile systems and diagnosability of weakly fair systems

Model checking of mobile systems and diagnosability of weakly fair systems

... PN model with the LoLA ...sition systems generated by EFCPs and those generated by the corresponding FCPs, with the view to prove the correctness of the proposed ...during model checking of RPS, can ...

117

Extending Activity Diagrams to Model Mobile Systems

Extending Activity Diagrams to Model Mobile Systems

... is mobile computing which gains more and more inter- ...be mobile too. Mobile hosts like laptops, WAPs, and PDAs can move between ...be mobile, like for example IBM’s Personal Area Network ...

16

RFID Data Model for Libraries

RFID Data Model for Libraries

... For the time being there are two types of general solutions: Non AFI based methods and AFI based method. Security of the data written on the tag was a major concern for the Finnish group. Although RFID tools are ...

55

Automated Attendance System using RFID and Face Recognition

Automated Attendance System using RFID and Face Recognition

... traditional systems. 2)Face Recognition: Face acknowledgment is the exploration of recognizing people by their behavioral ...face recognition for such still images can be categorized into three main ...

8

Real-time Gesture Recognition Using RFID Technology

Real-time Gesture Recognition Using RFID Technology

... passive RFID-based location-sensing systems use only the presence information from RFID readers to localize a ...tag. RFID readers can only sense the pres- ence of a tag within their detection ...

10

Child Activity Recognition Using Accelerometer and RFID Reader

Child Activity Recognition Using Accelerometer and RFID Reader

... Accelerometer, RFID reader, child activity, activity ...activity recognition using sensor such as accelerometer and RFID reader can be used in Varity of ...activity recognition can be adopted ...

8

Controlled Delegation Protocol in Mobile RFID Networks

Controlled Delegation Protocol in Mobile RFID Networks

... of RFID includes three parts: tag, reader, and back-end ...in RFID systems, despite its limited computation ability and power source from reader ...

13

An event model for real time systems in mobile environments

An event model for real time systems in mobile environments

... cooperating mobile robots internally equipped with a CAN-Bus, which is extended via gateways to a wireless LAN for event dissemination between the robots is presented in ...interconnecting mobile ...

6

Enhanced Security Model For Mobile Banking Systems In Tanzania

Enhanced Security Model For Mobile Banking Systems In Tanzania

... secured mobile transactions. Despite the release of more secure 3G systems which address most of the 2G security weaknesses, the backward compatibility with 2G systems poses a great security ...of ...

17

Show all 10000 documents...

Related subjects