Design and Implementation of an Active RFID Tag
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 6
Abstract
The Active Radio Frequency Identification tag that is RFID tag with battery is promising for RFID low power consumption and precise localization in indoor cluttered as well as for outdoor environment. In this paper, Design and Implementation of an Active RFID tag is proposed, with far reading distance, high reliability, low cost, low power consumption, and long life. The Active RFID tag is a transmitter designed using the 8051 microcontroller and wireless data transmission chip CC2500. The objective of tag is achieved by optimization of the circuit design for continuous Tag ID transmission; each Tag has its own unique ID. The transmitted Tag ID is captured by receiver we call it as RFID reader, the hardware and software implementation are presented in this paper with measurement in a typical indoor environment.
Authors and Affiliations
Ms. Rajeshri P. Mane
Comparative study of Gradient based image denoising methods
Images are playing very key role in various applications like medical imaging, remote sensing, and scientificresearch and in all these applications image clarity plays a major role. Any image that is captured has to be p...
A Theoretical Analysis of Different Hacking Techniques in Wireless Networks
Over the course of past few decades to today's world, even though the usage of computers is increasing rapidly, the users hesitate to store their personal information in their computers because of the security issues of...
Design and Comparative Analysis of CMOS Full Adder Cells Using Tanner EDA Tool
The binary adders are the fundamental and key component in digital signal processors, general purpose microprocessors and data-processing application specific integrated circuits. Therefore, binary adders are crucial bui...
Dynamic Time Quantum in Shortest Job First Scheduling Algorithm (DTQSJF) for Unpredictable Burst Time of Processes
In multitasking and time sharing operating system the performance of the CPU depends on waiting time, response time, turnaround time, context switches from the process mainly depends on the scheduling algorithm. Shortest...
A Secure Image Steganography Method Based on Neural Network
Steganography is the term used to describe the hiding of data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden data and to recover that data. By m...