Improving RFID read rate reliability by a systemic error detection approach
Reliability, security and privacy are the key concerns with RFID (radio frequency identification) adoption. While the mainstream RFID research is focused on solving the security and privacy issues, this paper focuses on addressing the reliability issues in general and detecting read rate failures in...
| Main Authors: | Potdar, Vidyasagar, Chang, Elizabeth, Hayati, P. |
|---|---|
| Other Authors: | Ustundag, Alp |
| Format: | Conference Paper |
| Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2007
|
| Online Access: | http://hdl.handle.net/20.500.11937/13850 |
Similar Items
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006)
by: Potdar, M., et al.
Published: (2006)
Automated Data Capture Technologies: RFID
by: Potdar, Vidyasagar, et al.
Published: (2007)
by: Potdar, Vidyasagar, et al.
Published: (2007)
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)
by: Sharif, A., et al.
Published: (2008)
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006)
by: Mohan, M., et al.
Published: (2006)
Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
RFID technology and its industrial applications
by: Potdar, Vidyasagar, et al.
Published: (2016)
by: Potdar, Vidyasagar, et al.
Published: (2016)
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013)
by: Han, Song, et al.
Published: (2013)
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008)
by: Yousuf, Y., et al.
Published: (2008)
Subjective and objective watermark detection using a novel approach: Bar-coded watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Multiple image watermarking using the SILE approach
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
A review on missing tags detection approaches in RFID system
by: Zainudin, Nur 'Aifaa, et al.
Published: (2018)
by: Zainudin, Nur 'Aifaa, et al.
Published: (2018)
Automatic identification and categorize zone of RFID reading in warehouse management system
by: Choong, Chun Sern, et al.
Published: (2020)
by: Choong, Chun Sern, et al.
Published: (2020)
Evaluation of spam detection and prevention frameworks for email and image spam - a state of art
by: Hayati, Pedram, et al.
Published: (2008)
by: Hayati, Pedram, et al.
Published: (2008)
Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Computational Approaches for Emotion Detection in Text
by: Binali, Haji, et al.
Published: (2010)
by: Binali, Haji, et al.
Published: (2010)
A survey of revenue sharing social software's systems
by: Chai, Kevin, et al.
Published: (2007)
by: Chai, Kevin, et al.
Published: (2007)
Open Source and Closed Source Software Development Methodologies
by: Potdar, Vidyasagar, et al.
Published: (2004)
by: Potdar, Vidyasagar, et al.
Published: (2004)
A quantization based robust image watermarking algorithm in the wavelet domain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Human Reliability as a Source of Error in Research
by: Chevez Bernaldo de Quiros, A., et al.
Published: (2008)
by: Chevez Bernaldo de Quiros, A., et al.
Published: (2008)
Robust and reliable dual the classification system with error compensation module
by: Ahmad Nasiruddin, Ab Razak
Published: (2014)
by: Ahmad Nasiruddin, Ab Razak
Published: (2014)
Clone tag detection in distributed RFID systems
by: Kamaludin, Hazalila, et al.
Published: (2018)
by: Kamaludin, Hazalila, et al.
Published: (2018)
LCART: Lightweight Congestion Aware Reliable Transport Protocol for WSN Targeting Heterogeneous Traffic
by: Sharif, Atif, et al.
Published: (2010)
by: Sharif, Atif, et al.
Published: (2010)
Investigation of features for classification RFID reading between two RFID reader in various support vector machine kernel function
by: Choong, Chun Sern, et al.
Published: (2022)
by: Choong, Chun Sern, et al.
Published: (2022)
Experts urge authorities to improve RFID system
by: The Sun
Published: (2022)
by: The Sun
Published: (2022)
An efficient approach to detecting missing tags in RFID data stream
by: Zainudin, Nur’Aifaa, et al.
Published: (2018)
by: Zainudin, Nur’Aifaa, et al.
Published: (2018)
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
by: Choong, Chun Sern
Published: (2020)
by: Choong, Chun Sern
Published: (2020)
A RFID Protocol For Detecting The Existence Of A Single RFID Tag By Two RFID Readers
by: Tan , Aik Theng
Published: (2012)
by: Tan , Aik Theng
Published: (2012)
Spam 2.0 state of the art
by: Hayati, P., et al.
Published: (2012)
by: Hayati, P., et al.
Published: (2012)
Emotion detection state of the art
by: Binali, Haji, et al.
Published: (2012)
by: Binali, Haji, et al.
Published: (2012)
Internal Consistency, Test–Retest Reliability and Measurement Error of the Self-Report Version of the Social Skills Rating System in a Sample of Australian Adolescents
by: Vaz, Sharmila, et al.
Published: (2013)
by: Vaz, Sharmila, et al.
Published: (2013)
Improved Convergence Rates for the Truncation Error in Gravimetric Geoid Determination
by: Evans, J., et al.
Published: (2000)
by: Evans, J., et al.
Published: (2000)
RFID data reliability optimiser based on two dimensions bloom filter
by: Yaacob, Siti Salwani, et al.
Published: (2017)
by: Yaacob, Siti Salwani, et al.
Published: (2017)
Enchancing RFID data quality and reliability using approximate filtering techniques
by: Kamaludin, Hazalila
Published: (2018)
by: Kamaludin, Hazalila
Published: (2018)
Prevention And Detection Mechanism For Security In Passive Rfid System
by: Khor, Jing Huey
Published: (2013)
by: Khor, Jing Huey
Published: (2013)
Web Spambot Detection Based on Web Navigation Behaviour
by: Hayati, Pedram, et al.
Published: (2010)
by: Hayati, Pedram, et al.
Published: (2010)
e-Forensics steganography systems for secret information retrieval
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Applications of wireless sensor networks in pharmaceutical industry
by: Potdar, M., et al.
Published: (2009)
by: Potdar, M., et al.
Published: (2009)
ERCTP: End-to-end reliable and congestion aware transport layer protocol for heterogeneous WSN
by: Sharif, Atif, et al.
Published: (2010)
by: Sharif, Atif, et al.
Published: (2010)
Similar Items
-
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006) -
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005) -
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006) -
Automated Data Capture Technologies: RFID
by: Potdar, Vidyasagar, et al.
Published: (2007) -
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)