Fuzzy Logic Control-Based Load Balancing Agent for Distributed RFID Systems
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Theoretical and Methodological Issues
The first search right algorithm for redundant reader elimination in RFID network
SEPADS'10 Proceedings of the 9th WSEAS international conference on Software engineering, parallel and distributed systems
Area surveillance using RFID system
EHAC'10 Proceedings of the 9th WSEAS international conference on Electronics, hardware, wireless and optical communications
Multiple zones surveillance system using RFID
WSEAS TRANSACTIONS on SYSTEMS
An Intelligent RFID System for Consumer Businesses
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
An extensive study of slotted Aloha-based RFID anti-collision protocols
Computer Communications
Real time location system in support of bayesian network
Proceedings of the Winter Simulation Conference
Hi-index | 0.00 |
Complete coverage of this widespread technology This is the only book available to offer in-depth, practical details for implementing an RFID project from start to finish. From Wal-Mart and beyond, RFID (Radio Frequency Identification) is in use everywhere--enabling superior supply-chain management by tracking inventory via microchip-tagged products. RFID Implementation delivers step-by-step instructions for initiating, installing, and managing an RFID rollout. Table of contentsPart I: The BasicsChapter 1. RFID Physics, Standards, and RegulationsChapter 2. The EPCglobal NetworkChapter 3. Components of an RFID SystemChapter 4. Bar Codes and RFID TagsPart II: ApplicationsChapter 5: RFID ApplicationsChapter 6: RFID at the United States Department of DefenseChapter 7: The Pharmaceutical IndustryChapter 8: RFID in the Supply ChainPart III: Your ProjectChapter 9: Business Justification for RFIDChapter 10: Plan Your ProjectChapter 11: Tag-and-ShipChapter 12: Engineering Tag PerformanceChapter 13: Data Integrity and Data SynchronizationChapter 14: PrivacyPart IV: ReferencesAppendix A: Typical Application ProfilesAppendix B: BibliographyGlossaryIndex