ﻻ يوجد ملخص باللغة العربية
For smart clothing integration with the wireless system based on radio frequency (RF) backscattering, we demonstrate an ultra-high frequency (UHF) antenna constructed from embroidered conductive threads. Sewn into a fabric backing, the T-match antenna design mimics a commercial UHF RFID tag, which was also used for comparative testing. Bonded to the fabric antenna is the integrated circuit chip dissected from another commercial RFID tag, which allows for testing the tags under normal EPC Gen 2 operating conditions. We find that, despite of the high resistive loss of the antenna and inexact impedance matching, the fabric antenna works reasonably well as a UHF antenna both in standalone RFID testing, and during variety of ways of wearing under sweaters or as wristbands. The embroidering pattern does not affect much the feel and comfort from either side of the fabrics by our sewing method.
Radio frequency identification (RFID) technology brings tremendous advancement in Internet-of-Things, especially in supply chain and smart inventory management. Phase-based passive ultra high frequency RFID tag localization has attracted great intere
Ambient Backscatter Communication (AmBC) is an emerging communication technology that can enable green Internet-of-Things deployments. The widespread acceptance of this paradigm is limited by low Signal-to-Interference-Plus-Noise Ratio (SINR) of the
We present a new vision for smart objects and the Internet of Things wherein mobile robots interact with wirelessly-powered, long-range, ultra-high frequency radio frequency identification (UHF RFID) tags outfitted with sensing capabilities. We explo
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification sy
Almost all existing RFID authentication schemes (tag/reader) are vulnerable to relay attacks, because of their inability to estimate the distance to the tag. These attacks are very serious since it can be mounted without the notice of neither the rea