Optimizing Efficiency Using a Low-Cost RFID-Based Inventory Management System
This paper presents the design and evaluation of an RFID-based laboratory equipment
tracking system, aimed at enhancing research laboratory inventory management, security …
tracking system, aimed at enhancing research laboratory inventory management, security …
WaveKey: Secure Mobile Ad Hoc Access to RFID-Protected Systems
This paper presents the design and evaluation of WaveKey, a cross-modal deep learning-
based method to enable mobile ad hoc in-situ access to RFID-protected cyber systems. Built …
based method to enable mobile ad hoc in-situ access to RFID-protected cyber systems. Built …
Conductive Fabric Based RFID Wearable Textile Antennas for Product Authentication and Quality Control
In this article, we present a novel use of wireless wearable Radio Frequency Identification
(RFID) technology for secure authentication via blockchain platform and long-term quality …
(RFID) technology for secure authentication via blockchain platform and long-term quality …
A collision reconciling-based B-ary tree-splitting missing tag identification protocol
M Fan, L Zhang, L Lei, C Yu - IEEE Communications Letters, 2024 - ieeexplore.ieee.org
Radio frequency identification technology has been widely used in various fields, including
manufacturing, retail, and smart cities. This letter proposes an innovative protocol called …
manufacturing, retail, and smart cities. This letter proposes an innovative protocol called …
Zero-effort Continuous Two-factor Authentication
AAS AlQahtani - Authorea Preprints, 2023 - techrxiv.org
Traditional two-factor authentication (2FA) systems often require users to enter a code or use
a physical token, which can be inconvenient or inconvenient. In this paper, we propose a …
a physical token, which can be inconvenient or inconvenient. In this paper, we propose a …
Exploring IoT Communication Technologies and Data-Driven Solutions
P Maurya, A Hazra, LK Awasthi - Learning Techniques for the Internet of …, 2023 - Springer
Over the past decade, Internet of Things (IoT) networks have been the subject of active
research due to their wide range of potential applications. The successful implementation …
research due to their wide range of potential applications. The successful implementation …
Sistem Keamanan IoT dengan Sensor RFID dan Kamera ESP32 untuk Verifikasi Identintas dan Visual
The main problem faced by the madrasah is the lack of visual evidence that can cause a
number of problems, including misuse of access cards and the inability to identify …
number of problems, including misuse of access cards and the inability to identify …
Practical Implementation of a Trapezoidal Waveform Generator in High Voltage SOI Technology
M Jankowski - 2024 31st International Conference on Mixed …, 2024 - ieeexplore.ieee.org
The paper presents an introduction to the analysis of the implementation of a high-voltage
trapezoidal waveform generator, starting with a schematic followed by a schematic version …
trapezoidal waveform generator, starting with a schematic followed by a schematic version …
Research on Anti-Skid-Rotation Control Strategy of Dual-Motor Four-Wheel-Drive Electric Vehicle Drive
T Zhang - Intelligent Transportation and Smart Cities, 2024 - ebooks.iospress.nl
This paper focuses on the research of longitudinal and lateral instability of dual motor
electric vehicles during driving. The main objective is to ensure that the vehicle maintains …
electric vehicles during driving. The main objective is to ensure that the vehicle maintains …
Array Configurations for Chipless RFID Tags: A Trade-Off Analysis
L Lasantha, N Karmakar - papers.ssrn.com
This study analyses the performance characteristics and trade-offs between radar cross
section (RCS), quality (Q) factor, and detectability of Pi-shaped array configurations for …
section (RCS), quality (Q) factor, and detectability of Pi-shaped array configurations for …