Full Paper View Go Back

Implementation of Raspberry functionality with RFID

Hemant Kumar Soni1

Section:Research Paper, Product Type: Journal
Vol.7 , Issue.3 , pp.40-42, Jun-2019

Online published on Jul 30, 2019


Copyright © Hemant Kumar Soni . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Hemant Kumar Soni, “Implementation of Raspberry functionality with RFID,” International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.3, pp.40-42, 2019.

MLA Style Citation: Hemant Kumar Soni "Implementation of Raspberry functionality with RFID." International Journal of Scientific Research in Network Security and Communication 7.3 (2019): 40-42.

APA Style Citation: Hemant Kumar Soni, (2019). Implementation of Raspberry functionality with RFID. International Journal of Scientific Research in Network Security and Communication, 7(3), 40-42.

BibTex Style Citation:
@article{Soni_2019,
author = {Hemant Kumar Soni},
title = {Implementation of Raspberry functionality with RFID},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2019},
volume = {7},
Issue = {3},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {40-42},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=371},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=371
TI - Implementation of Raspberry functionality with RFID
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Hemant Kumar Soni
PY - 2019
DA - 2019/07/30
PB - IJCSE, Indore, INDIA
SP - 40-42
IS - 3
VL - 7
SN - 2347-2693
ER -

723 Views    387 Downloads    263 Downloads
  
  

Abstract :
Radio Frequency Identification(RFID), is a remote ID strategy and now-a-days it become exceptionally mainstream. This is utilized for keen. This is secure framework and what`s more, do challenge stock by the use of radio repeat. This advancement is used in bank, and in book shop of universities and schools and so on. This innovation is exceptionally helpful, easy to use with lower overheads then again with the other standard methodology, for instance, scanner tag, biometrics, etc. It is of two sort RFID tag and RFID per client. RFID per client is a device that is prepared for examining and find information which set away in RFID marks. RFID names can take the extent of data from one sequential number to a couple of pages of data. Per clients will be a versatile that can without quite a bit of a stretch pass on in hands. Per clients can be worked in a structure of a room, assembling, etc. In this paper we discuss the RFID hardware, software, programming language used for RFID and future scope of RFID.

Key-Words / Index Term :
RFID, RFID Reader, RFID Tag, Data Analysis, Real Time System

References :
[1] R. Maruthaveni and V. Kathiresan, “A Critical Study on RFID”, IJSRNSC, Volume-6, Issue-2, pp. 62-65, April 2018.
[2]. Mandeep Kaur, Manjeet Sandhu, Neeraj Mohanand Parvinder S. Sandhu, “RFID Technology Principles, Advantages, Limitations & Its Applications”, IJCEE, Vol.3, No.1, February, 2011
[3]. T. Kindberg et al., “People, Places, and Things: Web Presence of the Real World”, ACM Mobile Networks & Applications J., pp. 365 – 376, 2002
[4]. Dibyendu Bikash Datta, “Radio Frequency Identification Technology: An Overview of its Components, Principles and Applications”.IJSETR, Volume 5, Issue 2,February 2016.
[5]. Juels, A., Rivest, R. L., & Szydlo, M. “The blocker tag: Selective blocking of RFID tags for consumer privacy”. In Proceedings of the 10th ACM conference on Computer and communications security pp.103-111, 2003
[6] https://www.indiamart.com/proddetail/em-18-rfid-reader-with-rs-232-125-khz-9157003455.html
[7] Jilani Sayyad, Mukadam Taha and Amol Sankpal, “Advanced Car Security System”, IJSRNSC, Volume-5, Issue-3, pp. 165-169, June 2017.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation