Near Field Communication and Its Applications in Various Fields
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 4
Abstract
In this paper basic concepts behind Near Field Communication technology which includes the working of Near Field Communication, advantages of NFC for short range communication, and applications of NFC in various fields like medical, military, cellular handsets, tourism and cultural field are discussed. NFC in medical field plays a prominent role which includes biomedical monitoring, heart rate monitoring, and in implant medical devices. Its application in military has been increasing day by day such that it can replace traditional use of RF communication in terms of short and secured wireless communication. NFC application in cellular handsets includes standards for selecting operating mode automatically. NFC application in tourism and cultural field helps the tourists a lot by providing information about their position and different tourist places.
Authors and Affiliations
G. Gopichand#1 , T. Krishna Chaitanya#2 , R. Ravi Kumar
Indoor Navigation on Google Maps and Indoor Localization Using RSS Fingerprinting
Contrasting to advances in street/outdoor navigation, wall mounted maps and signs continue to be the primary reference indoor navigation in hospitals, malls, museums, etc. The proliferation of mobile devices and the grow...
Design of Energy Efficient Arithmetic Circuits Using Charge Recovery Adiabatic Logic
Low power has emerged as a principle theme in today electronic industry. Energy efficiency is one of the most important features of modern electronic systems designed for high speed and portable applications....
WiTricity:Wireless Power Transfer By Non-radiative Method
A non-radiative energy transformer, commonly referred as WiTricity and based on ‘strong coupling’ between two coils which are separated physically by medium-range distances, is proposed to realize efficient wireless ener...
Multipair Public Key Cryptosystem
Cryptography mainly deals with security provided to the data access the network. Asymmetric key cryptography, also called as Public Key cryptography, uses two different keys (which forms a key pair),one key is used for e...
Design and Analysis of CMOS and Adiabatic 4-Bit Binary Multiplier
The power dissipation becoming a limiting factor in VLSI circuits and systems. Due to relatively high compatibility of VLSI systems used in various applications, the power dissipation in CMOS circuits arises from it’s sw...