000 | 04907nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-031-02474-0 | ||
003 | DE-He213 | ||
005 | 20240730163936.0 | ||
007 | cr nn 008mamaa | ||
008 | 220601s2006 sz | s |||| 0|eng d | ||
020 |
_a9783031024740 _9978-3-031-02474-0 |
||
024 | 7 |
_a10.1007/978-3-031-02474-0 _2doi |
|
050 | 4 | _aQA1-939 | |
072 | 7 |
_aPB _2bicssc |
|
072 | 7 |
_aMAT000000 _2bisacsh |
|
072 | 7 |
_aPB _2thema |
|
082 | 0 | 4 |
_a510 _223 |
100 | 1 |
_aWant, Roy. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981294 |
|
245 | 1 | 0 |
_aRFID Explained _h[electronic resource] : _bA Primer on Radio Frequency Identification Technologies / _cby Roy Want. |
250 | _a1st ed. 2006. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2006. |
|
300 |
_aX, 86 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Mobile & Pervasive Computing, _x1933-902X |
|
505 | 0 | _aIntroduction -- Principles of Radio Frequency Identification -- RFID Industry Standards -- Reading Collected RFID Tags -- Applications of RFID Tagging -- RFID Incorporating Sensing -- Deployment and Experience with RFID Systems -- Privacy, Kill Switches, and Blocker Tags -- Opportunities for RFID Integrated with Memory -- Challenges, Future Technology, and Conclusion. | |
520 | _aThis lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive tags); the focus here is on passive tags. An overview of the principles of the technology divides passive tags into devices that use either near field or far field coupling to communicate with a tag reader. The strengths and weaknesses of the approaches are considered, along with the standards that have been put in place by ISO and EPCGlobal to promote interoperability and the ubiquitous adoption of the technology. A section of the lecture has been dedicated to the principles of reading co-located tags, as this represents a significant challenge for a technology that may one day be able to automatically identify all of the items in your shopping cart in a just few seconds. In fact, RFID applications are already quite extensive and this lecture classifies the primary uses. Some variants of modern RFID can also be integrated with sensors enabling the technology to be extended to measure parameters in the local environment, such as temperature & pressure. The uses and applications of RFID sensors are further described and classified. Later we examine important lessons surrounding the deployment of RFID for the Wal-Mart and the Metro AG store experiences, along with deployments in some more exploratory settings. Extensions of RFID that make use of read/write memory integrated with the tag are also discussed, in particular looking at novel near term opportunities. Privacy and social implications surrounding the use of RFID inspire recurring debates whenever there is discussion of large scale deployment; we examine the pros and cons of the issues and approaches for mitigating the problems. Finally, the remaining challenges of RFID are considered and we look to the future possibilities for the technology. Table of Contents: Introduction / Principles of Radio Frequency Identification / RFID Industry Standards / Reading Collected RFID Tags / Applications of RFID Tagging / RFID Incorporating Sensing / Deployment and Experience with RFID Systems / Privacy, Kill Switches, and Blocker Tags / Opportunities for RFID Integrated with Memory / Challenges, Future Technology, and Conclusion. | ||
650 | 0 |
_aMathematics. _911584 |
|
650 | 0 |
_aEngineering. _99405 |
|
650 | 0 |
_aMobile computing. _93438 |
|
650 | 0 |
_aCooperating objects (Computer systems). _96195 |
|
650 | 0 |
_aUser interfaces (Computer systems). _911681 |
|
650 | 0 |
_aHuman-computer interaction. _96196 |
|
650 | 1 | 4 |
_aMathematics. _911584 |
650 | 2 | 4 |
_aTechnology and Engineering. _981295 |
650 | 2 | 4 |
_aMobile Computing. _93438 |
650 | 2 | 4 |
_aCyber-Physical Systems. _932475 |
650 | 2 | 4 |
_aUser Interfaces and Human Computer Interaction. _931632 |
710 | 2 |
_aSpringerLink (Online service) _981296 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031013461 |
776 | 0 | 8 |
_iPrinted edition: _z9783031036026 |
830 | 0 |
_aSynthesis Lectures on Mobile & Pervasive Computing, _x1933-902X _981297 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-02474-0 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c85149 _d85149 |