The Development of RFID Data Management System Based on Embedded System

2013 ◽  
Vol 718-720 ◽  
pp. 2080-2085
Author(s):  
Hong Qi Hao ◽  
Hong Tao Guo

Embedded system in general is formed by the embedded computer system and implementing device. Embedded system is a control program stored in ROM embedded processor control board. The basic function of Radio Frequency Identification (RFID) is to realize the precise data acquisition. RFID reader via the antenna and the RFID tag for wireless communication can be achieved on the label identification code and a memory data read or write operation. The paper presents the development of RFID data management system based on embedded system. Experimental results show that the proposed algorithm has high efficiency.

2011 ◽  
Vol 130-134 ◽  
pp. 2086-2089
Author(s):  
Fang Quan Xie ◽  
Zhan Huai Li ◽  
Qun Chen ◽  
Yan Ming Nie ◽  
Shang Lian Peng

RFID (Radio Frequency IDentification) technology has been widely used in many applications. In recent years, researchers have begun to study various RFID data management problems. Unfortunately, it is difficult for researchers to obtain massive raw RFID data because of hardware cost and limitations of lab environment. We have designed RFIDTango, a massive raw RFID data generator, to simulate real RFID application scenarios. In this paper, we present a system of RFIDTango and show how RFIDTango can simulate a RFID-enabled supermarket scenario effectively and efficiently.


2017 ◽  
Vol 4 (1) ◽  
pp. 62-66
Author(s):  
Luyen Ha Nam

From long, long time ago until nowadays information still takes a serious position for all aspect of life, fromindividual to organization. In ABC company information is somewhat very sensitive, very important. But how wekeep our information safe, well we have many ways to do that: in hard drive, removable disc etc. with otherorganizations they even have data centre to save their information. The objective of information security is to keep information safe from unwanted access. We applied Risk Mitigation Action framework on our data management system and after several months we have a result far better than before we use it: information more secure, quickly detect incidents, improve internal and external collaboration etc.


2014 ◽  
Vol 36 (7) ◽  
pp. 1485-1499 ◽  
Author(s):  
Jie SONG ◽  
Tian-Tian LI ◽  
Zhi-Liang ZHU ◽  
Yu-Bin BAO ◽  
Ge YU

1991 ◽  
Author(s):  
Douglas E. Shackelford ◽  
John B. Smith ◽  
Joan Boone ◽  
Barry Elledge

Sign in / Sign up

Export Citation Format

Share Document