scispace - formally typeset

Author

R. K. Pal

Bio: R. K. Pal is an academic researcher from Assam University. The author has contributed to research in topic(s): Radio-frequency identification. The author has an hindex of 1, co-authored 1 publication(s) receiving 3 citation(s).
Papers
More filters

Proceedings ArticleDOI
A. Bhattacharjya1, R. K. Pal2Institutions (2)
10 Jul 2011-
TL;DR: The paper describes the distributed service component framework and components design method for universal RFID system, which has the advantage of the rapid development of new scene-orientedRFID system.
Abstract: The design of Radio Frequency Identification RFID network [1], [3–5], [7], [9], [11], [12] hence plays a significant role for successfully deploying large-scale applications [7], [10], [13], [14]. This is especially true when the tagged object is on item-level. This paper discusses issues that should be considered in design of RFID network; analyzes the potential impacts of different RFID network design on the existing enterprise network [8] and presents the Distributed Design of Universal lightweight RFID system [2], [6] for Large-Scale RFID operation for different RFID deployment environment [13–16] and computing platforms, which has the advantage of the rapid development of new scene-oriented RFID system. Customization and reconfiguration with lightweight [2], [4–6] capabilities are the aspirations of our developed RFID distributed system for large scale operation. Based on OSGi Open Service Gateway Initiative technology [17–19] and its Service-Oriented development mode, the paper describes the distributed service component framework and components design method for universal RFID system.

3 citations


Cited by
More filters

Journal Article
TL;DR: This study presents the preparation of non-functional requirements catalogues for RFID middleware supported by Non-Functional Requirements Framework (NFR-Framework) and the effectiveness of the reuse of the catalogues.
Abstract: Non-functional requirements (NFR) are related to the user satisfaction about the quality attributes of the information system. In some cases these requirements are ignored or implemented by the end of the project in a chaotic way. It happens because, in many cases, the user does not have enough contact with the information system to solve these requirements, such as nonfunctional requirements for Radio-Frequency Identification (RFID) middleware. This study presents the preparation of non-functional requirements catalogues for RFID middleware supported by Non-Functional Requirements Framework (NFR-Framework). Two case studies were performed to evaluate the Requirements Engineering process in the creation of the NFR catalogues and the effectiveness of the reuse of the catalogues. As a result, a set of non-functional requirements are presented and organized into catalogues that work as the foundation for RFID system developers in the identification and validation of non-functional requirements for RFID middleware in information systems context.

6 citations


Journal ArticleDOI
01 Jan 2018-
TL;DR: To simulate a parking system with central unit which might be ready to manage the readers, and process the information gathered from the reader(s), the operation of reading tags was simulated using Rifidi Emulator platform.
Abstract: Radio Frequency Identification (RFID) is most wide used technique in the process of determining tagged items. The aim of this article is to simulate a parking system with central unit which might be ready to manage the readers, and process the information gathered from the reader(s). The proposed system supposes there is a park unit with a number of licensed cars owned by a particular company or any institute, therefor only the licensed cars (with tag) will enter the park. The software system use a Data base to store car's ID and different information with a Graphical User Interface (GUI) to manipulate the data which was designed by Visual Basic (VB 6.0). The operation of reading tags was simulated using Rifidi Emulator platform.

4 citations


Proceedings ArticleDOI
Xuan Shen1, Chenqi Bao2, Jianmin Bao1, Huan Wang1Institutions (2)
27 Jun 2014-
TL;DR: This paper presents an encryption scheme to protect the information stored in electric tags from being illegally used and researches the mass requests for the Information stored in the electric tags by the reader and eventually, gives a cache mechanism to solve that problem.
Abstract: Radio Frequency IDentification(RFID) is a novel technology of automated identification. The use of RFID, however, raises great concerns due to the serious security issue. In this paper, we at first propose a Secure Transaction Frame(STF) and a flow of object transaction based on networked RFID systems. Then, it is worth mentioning that the authentication technology in Secure Transaction Frame(STF) is able to verify the ownership of electric tags in order to deal with common attacks in the networked RFID system. Meanwhile, this paper presents an encryption scheme to protect the information stored in electric tags from being illegally used. After collecting relevant statistics and analyzing cases based on networked RFID systems, this paper also researches the mass requests for the information stored in the electric tags by the reader and eventually, gives a cache mechanism to solve that problem.

Performance
Metrics

Author's H-index: 1

No. of papers from the Author in previous years
YearPapers
20111