Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "RFiD" wg kryterium: Temat


Wyświetlanie 1-6 z 6
Tytuł:
RFID System Adaptivity in Supply Chain Management for Bangladesh
Autorzy:
Hasan, Md. Mahadi
Islam, Md. Mashrur
Ahmed, Shekh Rezwanul
Powiązania:
https://bibliotekanauki.pl/articles/1046540.pdf
Data publikacji:
2019
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Industrial Management
Managerial Chain
RFID
Supply Chain Management
Źródło:
World Scientific News; 2019, 138, 2; 113-140
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
IOT Security Challenges and Issues – An Overview
Autorzy:
Sujithra, M.
Padmavathi, G.
Powiązania:
https://bibliotekanauki.pl/articles/1193574.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Internet of Things
Network transmission
Privacy protection
RFID
Security
Opis:
A direct interpretation of the term Internet of Things refersto the use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Certainly, the IoT security is more than a technicalproblem as it needs series of regulations and faultless securitysystem for common purposes. So, the study of IoT security problem is an emergent issue to be introduced in a research paper. There are many problems in security of Internet of Things (IOT) crying out for solutions, such as RFID tag security, wireless security, network transmission security, privacy protection and information processing security. This article is based on the existing researches of network security technology. And it provides a new approach for researchers in certain IOT application and design, through analyzing and summarizing the security of IOT from various angles. In this paper, the traditional techniques are studied and evaluated, which protect the IoT resources such as devices and data against hacking and stealing.
Źródło:
World Scientific News; 2016, 41; 214-221
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Study on Technologies User for implementation of Internet of Things
Autorzy:
Sindhu, K. S.
Aasha, M.
Sivakumari, S.
Powiązania:
https://bibliotekanauki.pl/articles/1193553.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Internet of Things
M2M
NFC
RFID
V2V
Opis:
Internet of Things plays a major role in various areas. This paper presents a study about IOT in a wider context and describes about the various technologies involved in implementation of IOT and the application areas namely smart grid, smart home, smart security, industrial areas etc.
Źródło:
World Scientific News; 2016, 41; 99-104
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Surveillance and Sequestration Issues of Internet of Things (SSIoT)
Autorzy:
Banu, Reshma
Taranum, Ayesha
Powiązania:
https://bibliotekanauki.pl/articles/1193564.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
DDoS Attack
Denial of Service
Internet of Things
RFID
Surveillance
WSN
sequestration
Opis:
A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing- to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Inter- net protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight technical limitations of standard IP security protocols. Focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.
Źródło:
World Scientific News; 2016, 41; 171-185
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Antenna Design based on Meander Line Technique to be applied to RFID tag
Autorzy:
González, Ricardo Meneses
Peralta, Laura Montes
Powiązania:
https://bibliotekanauki.pl/articles/1190179.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
loop antenna
meander line technique
resonance frequency
parasitic elements
RFID tag antenna
Opis:
This work describes the design and implementation of an antenna based on meander line technique and ended in circular structures and two parasitic element acting as reflectors, in order to be applied as 915 MHz UHF RFID tag antenna. In order to determine the performance of varying design parameters on impedance, resonance frequency, radiation pattern, etc., HFSS simulation software has been used and experimental tests under an anechoic chamber have been applied. The achieved results show the feasibility of the designed antenna.
Źródło:
World Scientific News; 2016, 44; 35-49
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
IT management systems in the supply chain
Autorzy:
Nowakowska - Grunt, Joanna
Kowalczyk, Anna
Wojtaszek, Henryk
Powiązania:
https://bibliotekanauki.pl/articles/1177344.pdf
Data publikacji:
2018
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
DRP
EDI
IT systems
Just in Time
MRP
RFID
VMI
supply chain
Opis:
Information flows in the logistics and their volume become the starting point for considerations on the Logistics Information System - LIS. In order to select the most important information from the decision-correctness point of view, with the highest merit and in short time, appropriate measures and information techniques should be applied. Only computer techniques can handle with such an enormous amount of data and process them into valuable and useful information. The Logistics Information System is based on the broadly recognised ICT infrastructure, which constitutes the basis for application of further technical solutions. The popular document exchange technique is EDI (Electronic Data Interchange). EDI, as an inter-organizational system, ensures data and information transfer between companies, when pursuing the goals of logistics activity. With this technique, information is collected and transferred almost at every supply chain link.
Źródło:
World Scientific News; 2018, 104; 168-178
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-6 z 6

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies