• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 159
  • 25
  • 11
  • 10
  • 10
  • 6
  • 5
  • 4
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 271
  • 271
  • 271
  • 165
  • 113
  • 31
  • 31
  • 29
  • 26
  • 26
  • 24
  • 23
  • 22
  • 22
  • 21
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Selektivt larmsystem

Cronholm, Simon, Zelejakovic, Faruk, Olofsson, Mikael January 2003 (has links)
No description available.
12

The use of radio frequency identification (RFID) in tracking surgical sponges and reducing wrong-site surgeries

Williams, Kyle, Occeña, Luis. January 2008 (has links)
Title from PDF of title page (University of Missouri--Columbia, viewed on Feb. 19, 2008). The entire thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file; a non-technical public abstract appears in the public.pdf file. Dr. Luis Occeña, Thesis Supervisor. Includes bibliographical references.
13

Measuring and predicting the performance of RFID-tagged objects

Mallinson, Hugo Francis January 2010 (has links)
No description available.
14

A passive RFID real time sensing system for intelligent infrastructure

Sabesan, Sithamparanathan January 2011 (has links)
No description available.
15

Factors influencing the adoption of RFID technology in the New Zealand hospital environment dissertation [thesis] submitted to Auckland University of Technology in partial fulfilment of the degree of Master of Information Technology, Semester 2, 2004.

Houliston, Bryan. January 2004 (has links) (PDF)
Thesis (M Info Tech) -- Auckland University of Technology, 2004. / Also held in print (84 leaves, 30 cm.) in Wellesley Theses Collection (T 658.78 HOU)
16

Design considerations for a computationally-lightweight authentication mechanism for passive RFID tags

Frushour, John H. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Fulp, J.D. ; Huffmire, Ted. "September 2009." Description based on title screen as viewed on November 6, 2009. Author(s) subject terms: Passive RFID Systems, Tags, Clock, Electro-magnetic induction, authentication, hash, SHA--1. Includes bibliographical references (p. 59-60). Also available in print.
17

Radio Frequency IDentification: : Challenges and opportunities in a marketing context

Hansen, Kim, Penasa, Laura January 2014 (has links)
An extensive amount of research has been conducted on Radio Frequency IDentification (RFID) in the context of logistics, supply chain and manufacturing. Additionally, marketing opportunities related to RFID usage have been argued to exist. Despite this, limited research has focused on RFID in a marketing context which constitutes the research gap for this study.  A literature review on the subject area yielded an overview of the existing literature within the field. The literature review identified a research gap that constitutes the purpose of this study. The purpose is to investigate the factors influencing the adoption of Radio Frequency IDentification technology and whether it enhances retailers’ marketing opportunities. The study was of a qualitative nature and was conducted through a multiple case study. Data was gathered through semi-structured interviews with four companies. An archival analysis was performed in addition to the interviews. The interview data reveals that RFID technology adoption still has barriers to overcome, especially in regards to the identified marketing opportunities. Based on the conclusions of this study recommendations for managerial implications were formed. The findings of the study were able to support previous research stating that the main challenge for RFID adoption is the cost of the equipment. However, the previously identified marketing opportunities were not fully supported by the interviewed companies, thus, this area of research needs to be developed further.
18

An Analysis of the Radio Frequency Identification (RFID) Technology Implementation within an Independent Public Library System: A Case Study of the North Canton, Ohio Public Library

Lyons, Keith P. 01 January 2010 (has links)
An Analysis of the Radio Frequency Identification (RFID) Technology Implementation within an Independent Public Library System: A Case Study of the North Canton, Ohio Public Library by Keith P. Lyons June 2010 Public libraries require efficient control systems to maintain accurate inventories, statistics, and records of patron borrowing. Generally, public libraries use barcode technology to accomplish these tasks. Radio frequency identification (RFID) has gained the attention of public library personnel in recent years as a replacement for barcodes. RFID implementation contributes to improved staff productivity, increased operational efficiency, and improved item security as well. While potential benefits are significant, issues to consider prior to adoption include system costs, as well as privacy and security concerns. As a consequence of increased patron use and limited budgets, the role of RFID in the public library is promoted as a solution to many of today's challenges. RFID in the public library can assist by improving inventory tracking, improving customer service, and decreasing theft. Using the case study methodology in conjunction with the System Development Life Cycle (SDLC), the author examined RFID use at the North Canton Public Library and its capabilities in improving inventory tracking, providing item security, and supporting customer service. Qualitative data were collected using focused interviews, documentation, direct observation, and participant observation. Findings from this investigation revealed a significant decrease in time required to perform inventory tasks and an increase in time available for library staff to assist patrons. Additionally, evidence demonstrated an increase in the efficiency of patron records due to the automation of the checkout process. Patron privacy and data security were maintained by adherence to RFID implementation guidelines established by the American Library Association (ALA). The findings from this investigation provide public library administrators considering adoption of RFID with a thorough understanding of pre-implementation considerations and the benefits, drawbacks, logistical concerns, and privacy issues that must be addressed for successful results.
19

Implementation of a VANET Geo-Fence Based Adaptive Traffic Light Control Scheme

Unknown Date (has links)
In this thesis we extend the VANET-based approach to counting vehicles at a traffic light by implementing a Geo-fence Based Vehicle Counting Algorithm which supports the use of RFID technology. This implementation utilizes the concept of geo-fencing to create a Zone of Interest (ZOI) that sections off a roadway that is relevant to a traffic intersection. All vehicles in this ZOI are used to determine the required length of the green-cycle time. By utilizing vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) technologies, we broadcast beacons that are propagated to all vehicles in the ZOI from the infrastructure which in this case is the traffic light controller. These beacons are used to determine the last vehicle location in the ZOI. A timing algorithm ensures that the last vehicle broadcasts first. The beacons are sent using the IEEE 1609.4 Wireless Access in Vehicular Environments Standard Vendor Specific Action (VSA) frames on the Smart Drive Initiative Vehiclular Ad Hoc Networks testbed. This work is implemented in conjunction with the Vehicular Multi-technology Communication Device (VMCD) supported by the National Science Foundation. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2016. / FAU Electronic Theses and Dissertations Collection
20

Anti-collision techniques for RFID systems.

January 2006 (has links)
Chiang Kong Wa. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (leaves 74-79). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Technology Overview --- p.4 / Chapter 2.1 --- Components of RFID Systems --- p.5 / Chapter 2.1.1 --- Tag --- p.6 / Chapter 2.1.2 --- Reader --- p.9 / Chapter 2.1.3 --- Software systems --- p.10 / Chapter 2.1.4 --- Communication infrastructure --- p.11 / Chapter 2.2 --- Frequency Regulations and Standards --- p.11 / Chapter 2.2.1 --- RFID frequency bands --- p.11 / Chapter 2.2.2 --- Standards --- p.12 / Chapter 2.3 --- Advantages and Limitations of RFID Technology --- p.14 / Chapter 2.4 --- Applications --- p.17 / Chapter 3 --- Background of Research --- p.20 / Chapter 3.1 --- Anti-collision methods for RFID systems --- p.22 / Chapter 3.1.1 --- Stochastic Anti-collision Protocols --- p.25 / Chapter 3.1.2 --- Deterministic Anti-collision Protocols --- p.27 / Chapter 4 --- Even-Odd Binary Tree Protocol --- p.30 / Chapter 4.1 --- Protocol Description --- p.31 / Chapter 4.2 --- Time Complexity Analysis --- p.34 / Chapter 4.3 --- Performance Evaluation --- p.37 / Chapter 4.4 --- Summary --- p.41 / Chapter 5 --- Prefix-Randomized Query-Tree Protocol --- p.44 / Chapter 5.1 --- Tag Identification - Known Tag Set Size --- p.45 / Chapter 5.1.1 --- Protocol Description --- p.45 / Chapter 5.1.2 --- Time Complexity Analysis --- p.47 / Chapter 5.1.3 --- Optimal Initial Prefix Length --- p.50 / Chapter 5.1.4 --- Optimal Number of Level-1 Nodes --- p.52 / Chapter 5.2 --- Tag Identification - Unknown Tag Set Size --- p.53 / Chapter 5.2.1 --- Initial Prefix Length Adaptation Algorithm --- p.54 / Chapter 5.2.2 --- Computing r*Δ(l) --- p.55 / Chapter 5.2.3 --- Optimal Choice of Step Size Δ --- p.56 / Chapter 5.3 --- Performance Evaluation --- p.59 / Chapter 5.4 --- Summary --- p.64 / Chapter 6 --- Conclusion and Future Work --- p.68 / Chapter 6.1 --- Conclusion --- p.68 / Chapter 6.2 --- Future Work --- p.70 / Bibliography --- p.74

Page generated in 0.164 seconds