13.5 MHz RFID(NFC) ANTENNA DESIGN FOR DEDICATED MOBILE APPLICATIONS WITH IMPROVED RESULTS
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
t—First part of the paper discusses about the latest trend within RFID is to use the technology for more advanced applications that can replace the magnet cards used today for payment and electronic key cards. The more advanced types of these cards, called proximity cards. This standard, named Near Field Communication (NFC) can therefore be used to replace key cards and Visa/MasterCard. At the same time, a small NFC reader integrated in the phone opens up for many new possibilities. If this idea is accepted by consumers and companies, the cell phone could be the only device needed when a person leaves the house, since it in addition to being a phone also is a set of keys, an ID card and a wallet. Later part of paper discuss about the RFID antenna and its revolutions. New designs with new results and all other parameters to describe the antenna design in detail.
Authors and Affiliations
AMIT GUPTA: , Sudeep Baudha: , Shrikant Pankey :
Study & Analysis of Web Content Mining Tools to Improve Techniques of Web Data Mining
Web content mining in normal parlance is to download information available on the websites. Such a process involves tremendous stress and time-taking. To augment such a process the software related to web content m...
Analysis of Image Segmentation and Edge Detection in Medical Images
Accurate Image segmentation and edge detection are fundamental for Medical diagnosis, Locate tumours and other pathologies, Measure tissue volumes, computer-guided imaginary, Treatment Planning and Study of anatomi...
ition-based Opportunistic Routing for Highly Dynamic MANETSition-based Opportunistic Routing for Highly Dynamic MANETS
This paper solves the problem of delivering data packets for highly dynamic mobile ad hoc networks in a timely and reliable way. Already existing ad hoc routing protocols are susceptible to node mobilty.The issue is s...
WPA Exploitation In The World Of Wireless Network
Wifi device uses security authentication protocol even though they are having some weakness. Generally wep, wpa protocols are used for security purpose. This is already proved that WEP authentication protocol is a we...
Simulation and Analysis of Dropped Packets for DSR Protocol in VANETs Simulation and Analysis of Dropped Packets for DSR Protocol in VANETs
VANET (Vehicular Adhoc Network) is a new concept in the field of wireless networks. The main objective of VANET is to build a powerful network between mobile vehicles so that the vehicles can talk to each other for...