scholarly journals Interrogation zone determination in HF RFID systems with multiplexed antennas

2015 ◽  
Vol 64 (3) ◽  
pp. 459-470 ◽  
Author(s):  
Piotr Jankowski-Mihułowicz ◽  
Mariusz Węglarski

Abstract The operation of an anti-collision RFID system is characterized by the interrogation zone which should be estimated in any direction of 3D space for a group of electronic transponders. The interrogation zone should be as large as possible. However, the many problems in this area are due to the fact that energy can be transferred to transponders only on a limited distance. The greatest flexibility in developing RFID applications and shaping the interrogation zone can be achieved using the system with an antenna multiplexer. Therefore the problem of the interrogation zone determination in HF RFID systems with two orthogonal RWD antennas is presented in the paper. The perceived issues have been effectively dealt with and the solution has been proposed on the basis of the elaborated model. Conducted studies have been used to develop the software tool JankoRFIDmuxHF in the Mathcad environment. The research results are analysed in an example system configuration. The specialized measuring stand has been used for experimental verification of the identification efficiency. The convergence of the measurements and calculations confirms a practical usefulness of the presented concept of interrogation zone determination in anti-collision systems. It also shows the practical utility of the developed model and software tools.

2017 ◽  
Vol 66 (4) ◽  
pp. 761-772 ◽  
Author(s):  
Piotr Jankowski-Mihułowicz ◽  
Damian Kawalec ◽  
Mariusz Węglarski ◽  
Wojciech Lichoń

Abstract An attempt to increase the geometric size of the interrogation zone in UHF RFID systems with a phased array antenna is presented in this paper. The interrogation zone should be as large as possible. However, energy can be transferred to transponders only to a limited distance. The greatest flexibility in developing RFID applications and shaping the interrogation zone can be achieved using a phased array antenna. The perceived issues have been effectively dealt with and the solution has been proposed on the basis of an elaborated model. Conducted studies have been used to develop a software tool in the Mathcad environment. The research results are analyzed in detail for different system configurations and can be implemented in practical projects to be developed in cooperation with the industry.


2021 ◽  
Vol 21 (4) ◽  
pp. 316-321
Author(s):  
Abdul Basit ◽  
Muhammad Irfan Khattak ◽  
Ayman Althuwayb ◽  
Jamel Nebhen

In this article, a simple method is developed to design a highly miniaturized tri-band bandpass filter (BPF) utilizing two asymmetric coupled resonators with one step discontinuity and one uniform impedance resonator (UIR) for worldwide interoperability for microwave access (WiMAX) and radio frequency identification (RFID) applications. The first and second passbands located at 3.7 GHz and 6.6 GHz are achieved through two asymmetric coupled step impedance resonators (SIRs), while the third passband, centered at 9 GHz, is achieved using a half-wavelength UIR, respectively. The fundamental frequencies of this BPF are implemented by tuning the physical length ratio (α) and impedance ratio (R) of the asymmetric SIRs. The proposed filter is designed and fabricated with a circuit dimension of 13.69 mm × 25 mm (0.02 λg × 0.03 λg), where λg represents the guided wavelength at the first passband. The experimental and measured results are provided with good matching.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Ju-min Zhao ◽  
Ding Feng ◽  
Deng-ao Li ◽  
Wei Gong ◽  
Hao-xiang Liu ◽  
...  

Radio Frequency Identification (RFID) is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP) to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.


Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4752 ◽  
Author(s):  
Khwaja Mansoor ◽  
Anwar Ghani ◽  
Shehzad Chaudhry ◽  
Shahaboddin Shamshirband ◽  
Shahbaz Ghayyur ◽  
...  

Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID systems and many such systems are based on only lightweight primitives, including symmetric encryption, hash functions, and exclusive OR operation. Many solutions based on only lightweight primitives were proved insecure, whereas, due to resource-constrained nature of RFID devices, the public key-based cryptographic solutions are unenviable for RFID systems. Very recently, Gope and Hwang proposed an authentication protocol for RFID systems based on only lightweight primitives and claimed their protocol can withstand all known attacks. However, as per the analysis in this article, their protocol is infeasible and is vulnerable to collision, denial-of-service (DoS), and stolen verifier attacks. This article then presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks. The security of the proposed protocol is formally analyzed using Burrows Abadi-Needham (BAN) logic and under the attack model of automated security verification tool ProVerif. Moreover, the security features are also well analyzed, although informally. The proposed protocol outperforms the competing protocols in terms of security.


2019 ◽  
Vol 22 (3) ◽  
pp. 194-201
Author(s):  
Saja Majeed Hashim ◽  
Osamah Fadhil Abdulateef ◽  
Falah Ibrahim Alattar

This paper displays the improvement of Graphical User Interface programming for sizing principle segment in Stand-Alone PV system and PV- Diesel hybrid power system based on Iraq conditions. The solar system software is a tool depends on the input data by the user to give correct results on the basis of what has been introduced. Therefore, this software tool Includes products (PV modules, charge controller, inverter, battery and diesel generator) which can be obtained from the market with their detail. This software presents a guideline for photovoltaic system integrator to match the load requirement to design the effective size of components and system configuration, in hybrid PV–Diesel system. The ratio of photovoltaic solar energy to diesel generators is introduced by considering the contribution of hybrid system energy.


2021 ◽  
Author(s):  
Alfonso Sánchez-Moya

Intimate Partner Violence (IPV) is undoubtedly one of the most worrying concerns in today’s global societies. Due to the many intertwined factors that explain the persistence of this reality among people from all sorts of backgrounds, finding a uniform strategy to cope with this social issue is far from unproblematic. In this study, I contribute to a growing field of research that examines the discourse of female survivors of IPV in online contexts. The main objective this research pursues is to identify relevant linguistic patterns used by these women to represent themselves and their perpetrators in a publicly-available online forum. More specifically, I seek to ascertain discursive traits that characterise women in an initial stage in contrast to a final stage within an abusive relationship. To this end, I adopt a Corpus-Assisted Discourse Studies approach (CADS) in a digital corpus of circa 136,000 words, which are analysed with the software tool Sketch Engine (SkE). Findings show the most salient discursive traits that characterise IPV online discourse. Additionally, and drawing from verb patterns and their semantic categorisation, I highlight relevant verbal tendencies that connect linguistic textual evidence that contributes to sustaining the power imbalances that also define this social phenomenon.


1988 ◽  
Vol 6 (5) ◽  
pp. 388-392 ◽  
Author(s):  
CHU RIN Go ◽  
Isao SHIMOYAMA ◽  
Hirofumi MIURA

2015 ◽  
Vol 2015 (1) ◽  
pp. 000771-000775

A QFN (quad flat no-lead) package (Figure 1) is one of the many platforms for fabricating semiconductor related devices. Though not as small as die level packages such as bumped die (CSP-chip scale packaging), the QFN package is designed to minimize its footprint by eliminating the “gull wing” protrusion of metal leads beyond the main package body. When compared to leaded packages QFN packages also provide better thermal performance as well as the reduced size.Figure 1Top and bottom view of finished QFN packagesFigure 1. Top and bottom view of finished QFN packages A QFN can also integrate multiple die, inductors, passives and other components into “modular” solutions where the QFN footprint serves as a multi-function, stand-alone platform. This conceptualization saves board space and improves functionality in a smaller area. In wireless and RFID applications the second die might be a PA (power amplifier) or RF transmitter die. In other applications antennae and coils are incorporated as actual features of the die during design or added post processing as a subsequent metalized layer (which is a poor utilization of silicon real estate). But often times these windings end up as an external feature built into the PCB. These designs are functional and have been sold for years, but adding components and layers onto PC boards or die require additional processing, increase size and cycle time which translate into higher costs. A better process eliminates post processing on the die and reducing the number of extra components added to the QFN or module. An even better process would integrate functionality into the package itself and reduce the size of the finished product. While maintaining leadframe integrity, lead pitch can be reduced by more than 50% down to 175μm over standard QFNs enabling higher density and higher IO count by improving etch control. Controlled etch not only allows for higher density but provides the ability to add windings directly into the package further increasing functionality and versatility. These windings, with 10μm lines and 10um spacing available in various geometrical shapes, can be used for inductors or antennae allowing for energy harvesting and/or RF communications.


2008 ◽  
pp. 239-251
Author(s):  
Robert Tobias

In a collective action, people act together with the intention of producing public goods. Public, or collective, goods are states or objects that benefit the many but only emerge if a sufficient number of persons make contributions. The present study explains de dynamics of participation in collective action campaigns by considering the interaction of different processes. With the resulting model it is possible to determine the optimal combination of diffusion measures for such a campaign. Before using the model for experimenting, we calibrate its parameters using data from a real world collective action. We find this to be a most important step in order to demonstrate that the model can be grounded empirically and to demonstrate the practical usefulness of simulation for consulting and design of real world processes. Finally, some “what if” scenarios reveal the model’s power of explanation and prediction.


Author(s):  
Alan D. Smith

RFID-based solutions are essential inventory management tools, supplying more information than the standard barcode that help eliminate the potential for inventory stock-outs and reducing theft-based inventory shrinkage. A relatively detailed discussion of these techniques is included in this chapter by addressing some of the many concerns of inventory shrinkage. As is evident from the empirical section of this chapter, although RFID may be perceived as a cutting-edge business solution, RFID systems and its implementations still prove to be a difficult process to implement and achieve. Many companies have avoided the idea of introducing RFID systems, possibly due to being overwhelmed with the new technologies. However, its impacts on reducing inventory shrinkage are fairly clear and decisive.


Sign in / Sign up

Export Citation Format

Share Document