Design Of A Rceat Architecture For Detecting Multi- Bit Error In RFID
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
Radio Frequency Identification (RFID) plays an important role in Warehouse Management, especially during the automatic identification of items. Unfortunately, a warehouse environment has electromagnetic interferences causing read failures in the RFID system. Here, we will considering networking environment, the cyclic redundancy check is widely utilized to determine whether error have been introduced during transmission over physical links. Cyclic redundancy check is extensively used for encoding and decoding communication channel burst errors, where a transient fault causes several adjacent data errors. In this method, the transmitter divides of the message by an agreed-upon polynomial called the generator and concatenates the calculated residue to the message. The receiver divides what it receives by the generator again. A zero residue indicates error-free transmission and a nonzero residue is interpreted as an error. In this paper, the RFID system employs the Cyclic Redundancy Check (CRC) as an error detection scheme. This paper presents a proposed Reliable and Cost Effective Anti-collision technique (RCEAT) or Radio Frequency Identification (RFID) Class 0 UHF tag. The RCEAT architecture consists of two main subsystems PreRCEAT and PostRCEAT. The proposed system is designed using Verilog HDL in FPGA SPARTAN 6 device, which has achieved a good validation. The system is simulated using Modelsim and synthesized using Xilinx Synthesis Technology.
Authors and Affiliations
Indugula Anusha Devi, B Bala Krishna, V N M Brahmanandam
An Approach to reduce Non-linearity of HIPERLAN/2 system using Neural Network
Simulation of ETSI’s High Performance Local Area Network Type 2(HIPERLAN/2) is presented. In this paper we present performance of HIPERLAN/2 model via a MATLAB/Simulink simulation with the original MATLAB/Simulink mo...
Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network
Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb...
Stategy And Necessity Trades For Smile Networks
The mobile social networks are likely to a large extent enhance interaction with mobile users and shared the information in encounter-based social network. In this encounter traditional social network as opposed user...
Embedding of Data in Motion Vectors by Using Steganography Concept
This paper applies steganography algorithm in videos. In the proposed method, we take GOP techniques which are nothing but video algorithms so we use advantage of prediction types of MPEG bit streams to embed waterma...
Secure Data-Centric Routing Protocols in categorized WSN Using Proficient KDS
Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. In this paper an efficient key distribution s...