Implementation of Raspberry functionality with RFID

Authors

  • Hemant Kumar Soni Dept. of CSE, Amity School of Engineering and Technology, Amity University, Gwalior, India

Keywords:

RFID, RFID Reade, RFID Tag, Data Analysis, Real Time System

Abstract

Radio Frequency Identification(RFID), is a remote ID strategy and now-a-days it become exceptionally mainstream. This is utilized for keen. This is secure framework and what`s more, do challenge stock by the use of radio repeat. This advancement is used in bank, and in book shop of universities and schools and so on. This innovation is exceptionally helpful, easy to use with lower overheads then again with the other standard methodology, for instance, scanner tag, biometrics, etc. It is of two sort RFID tag and RFID per client. RFID per client is a device that is prepared for examining and find information which set away in RFID marks. RFID names can take the extent of data from one sequential number to a couple of pages of data. Per clients will be a versatile that can without quite a bit of a stretch pass on in hands. Per clients can be worked in a structure of a room, assembling, etc. In this paper we discuss the RFID hardware, software, programming language used for RFID and future scope of RFID.

 

References

R. Maruthaveni and V. Kathiresan, “A Critical Study on RFID”, IJSRNSC, Volume-6, Issue-2, pp. 62-65, April 2018.

. Mandeep Kaur, Manjeet Sandhu, Neeraj Mohanand Parvinder S. Sandhu, “RFID Technology Principles, Advantages, Limitations & Its Applications”, IJCEE, Vol.3, No.1, February, 2011

. T. Kindberg et al., “People, Places, and Things: Web Presence of the Real World”, ACM Mobile Networks & Applications J., pp. 365 – 376, 2002

. Dibyendu Bikash Datta, “Radio Frequency Identification Technology: An Overview of its Components, Principles and Applications”.IJSETR, Volume 5, Issue 2,February 2016.

. Juels, A., Rivest, R. L., & Szydlo, M. “The blocker tag: Selective blocking of RFID tags for consumer privacy”. In Proceedings of the 10th ACM conference on Computer and communications security pp.103-111, 2003

https://www.indiamart.com/proddetail/em-18-rfid-reader-with-rs-232-125-khz-9157003455.html

Jilani Sayyad, Mukadam Taha and Amol Sankpal, “Advanced Car Security System”, IJSRNSC, Volume-5, Issue-3, pp. 165-169, June 2017.

Downloads

Published

2019-06-30

How to Cite

[1]
H. K. Soni, “Implementation of Raspberry functionality with RFID”, Int. J. Sci. Res. Net. Sec. Comm., vol. 7, no. 3, pp. 40–42, Jun. 2019.

Issue

Section

Research Article

Similar Articles

<< < 9 10 11 12 13 14 15 16 17 18 > >> 

You may also start an advanced similarity search for this article.