Optimizing Efficiency Using a Low-Cost RFID-Based Inventory Management System

I Bandara, O Simpson, Y Sun - 2024 International Wireless …, 2024 - ieeexplore.ieee.org
This paper presents the design and evaluation of an RFID-based laboratory equipment
tracking system, aimed at enhancing research laboratory inventory management, security …

WaveKey: Secure Mobile Ad Hoc Access to RFID-Protected Systems

D Han, A Li, J Li, Y Zhang, T Li… - 2024 IEEE 44th …, 2024 - ieeexplore.ieee.org
This paper presents the design and evaluation of WaveKey, a cross-modal deep learning-
based method to enable mobile ad hoc in-situ access to RFID-protected cyber systems. Built …

Conductive Fabric Based RFID Wearable Textile Antennas for Product Authentication and Quality Control

B Avireni, Y Chu, E Kepros, SK Ghosh… - 2024 IEEE 74th …, 2024 - ieeexplore.ieee.org
In this article, we present a novel use of wireless wearable Radio Frequency Identification
(RFID) technology for secure authentication via blockchain platform and long-term quality …

A collision reconciling-based B-ary tree-splitting missing tag identification protocol

M Fan, L Zhang, L Lei, C Yu - IEEE Communications Letters, 2024 - ieeexplore.ieee.org
Radio frequency identification technology has been widely used in various fields, including
manufacturing, retail, and smart cities. This letter proposes an innovative protocol called …

Zero-effort Continuous Two-factor Authentication

AAS AlQahtani - Authorea Preprints, 2023 - techrxiv.org
Traditional two-factor authentication (2FA) systems often require users to enter a code or use
a physical token, which can be inconvenient or inconvenient. In this paper, we propose a …

Exploring IoT Communication Technologies and Data-Driven Solutions

P Maurya, A Hazra, LK Awasthi - Learning Techniques for the Internet of …, 2023 - Springer
Over the past decade, Internet of Things (IoT) networks have been the subject of active
research due to their wide range of potential applications. The successful implementation …

Sistem Keamanan IoT dengan Sensor RFID dan Kamera ESP32 untuk Verifikasi Identintas dan Visual

I Gunawan, K Hamdi, JK Moko, B Sunaryo - Prosiding SISFOTEK, 2024 - seminar.iaii.or.id
The main problem faced by the madrasah is the lack of visual evidence that can cause a
number of problems, including misuse of access cards and the inability to identify …

Practical Implementation of a Trapezoidal Waveform Generator in High Voltage SOI Technology

M Jankowski - 2024 31st International Conference on Mixed …, 2024 - ieeexplore.ieee.org
The paper presents an introduction to the analysis of the implementation of a high-voltage
trapezoidal waveform generator, starting with a schematic followed by a schematic version …

Research on Anti-Skid-Rotation Control Strategy of Dual-Motor Four-Wheel-Drive Electric Vehicle Drive

T Zhang - Intelligent Transportation and Smart Cities, 2024 - ebooks.iospress.nl
This paper focuses on the research of longitudinal and lateral instability of dual motor
electric vehicles during driving. The main objective is to ensure that the vehicle maintains …

Array Configurations for Chipless RFID Tags: A Trade-Off Analysis

L Lasantha, N Karmakar - papers.ssrn.com
This study analyses the performance characteristics and trade-offs between radar cross
section (RCS), quality (Q) factor, and detectability of Pi-shaped array configurations for …