排序方式: 共有46条查询结果,搜索用时 218 毫秒
11.
iPico China 《中国电子商情》2006,(1)
RFID在矿山中承担着挽救生命的重任,本文以南非的Paardekraal矿为例介绍了如何使用RFID技术实现救助和保护矿工的生命。这对于矿难频发的的我国矿业生产有极为重要的实际意义。 相似文献
12.
13.
In this paper, the design of an ultra-low-power UHF RFID tag is introduced. The system architecture and the communication protocols are chosen to operate with the minimum requirements possible from the RFID tag. By moving most of system functionality to the RFID reader side, the circuit requirements of the RFID tag circuits are relaxed. Supply voltages for both analog and digital parts are chosen carefully for minimum power consumption. The RFID tag is designed in standard digital 0.13 μm CMOS technology. Simulations results of the main blocks are shown. The power consumption of the chip is only 1 μW, and the chip area is only 0.14 mm×0.23 mm. 相似文献
14.
15.
Jordan Blodgett 《Tetrahedron letters》2004,45(35):6649-6652
A solution phase synthesis strategy was investigated using 4-tert-butylphenyl group as the tag and a beta-cyclodextrin column as the affinity chromatographic support for the isolation of compounds containing the tag. It was found that compounds containing the tag have significantly longer retention times on the beta-cyclodextrin column than those compounds that do not have such a tag. The tag is chemically inert and can be introduced onto and removed from target compounds readily. This solution phase synthesis method was applied to the synthesis of some simple amino acid derivatives. 相似文献
16.
According to the Radio frequency identifi-cation (RFID) tag cloning attack problems of RFID system and the existing problems of intrusion detection research based on incomplete RFID traces, this paper proposes a method of intrusion detection by combining the Markov chain technology and probability statistics technology. We use this method to calculate the threshold that is used to determine whether the tag event is a cloning tag intrusion one. Current research focuses on RFID intrusion detec-tion under the condition of complete RFID traces, such as encryption algorithm improvement, tag authentication protocol improvement, and track and trace technology in RFID supply chain. RFID traces are occasionally to be incomplete, which causes the above methods to be ineffi -cient. Our method proposed in this paper is the solution to incomplete RFID traces which makes up for the study of RFID intrusion detection research. 相似文献
17.
18.
19.
艾利丹尼森打印系统部是全球最大的条码打印机和RFID标签生产商之一,一直引领条码应用科技。本文介绍了艾利丹尼森公司RFID应用的一些案例。 相似文献
20.