期刊文献+

基于RFID的智能购物管理系统设计与实现 被引量:10

Design and Implementation of Smart Shopping Management System Based on RFID
下载PDF
导出
摘要 针对超市购物系统运行效率过低的问题,提出基于射频识别技术的快速购物方法和防盗策略系统。对于需要进行快速、大量扫描的购物系统,给出一种改进的二进制搜索防碰撞算法,实现对期望货品的完全信息快速采集,并分析冗余识别和死角识别的产生条件,提高该系统的准确性和可靠性。在此基础上,增加防盗环节,在指定区域扫描未经过结账处理的货品,并及时通知相关人员。根据不同货品条件,设计2种灵活的进货方式,便于超市服务人员进行管理。实验结果表明,该智能购物系统能够快速准确地对消费者所购商品进行结账,同时可以较好地抑制系统运行过程中可能出现的数据误差。 For a class of low efficiency of supermarket shopping system,this paper proposes a system for fast shopping methods and security strategy based on Radio Frequency Identification(RFID) technology. For fast,large scan shopping system,this paper presents an improved binary search anti-collision algorithm to achieve a rapid and complete information collection on the expectation goods and to analyse generating conditions of redundancy identification and dead identification,for universal situation, which can improve the system's accuracy and reliability. On this basis, the system increases the security mechanisms, checkout goods can be scan in the designated area, and the staff can be notified. In addition, for different conditions, two flexible ways of purchase are designed, which are easy for service management. Experimental results show the smart system not only can express check-out for buying things,but also restrains the errors happened in the buying course.
作者 贾宁
出处 《计算机工程》 CAS CSCD 北大核心 2015年第9期25-30,38,共7页 Computer Engineering
基金 辽宁省大学生创新创业训练基金资助项目(201313631019)
关键词 射频识别 快速结账 快速存储 防碰撞算法 防盗策略 Radio Frequency Identification(RFID) express checkout express storage anti-collision algorithm securitystrategy
  • 相关文献

参考文献17

  • 1郎为民.射频识别(RFID)技术原理与应用[M].北京:机械工业出版社,2006.
  • 2杨海东,杨春.RFID安全问题研究[J].微计算机信息,2008,24(8):238-240. 被引量:34
  • 3刘斌,平锐,孟德良.RFID的潜在问题初探[J].中国无线电,2006(1):39-40. 被引量:10
  • 4Juels A. RFID Security and Privacy: A Research Sur- vey[J:. IEEE Journal on Selected Areas in Communi- cations, 2006,24 ( 2 ) : 381-391.
  • 5Kossel M A, Kung R, Benedickter H, et al. An Active Tagging System Using Circular-polarization Modula- tion:J3. IEEE Transactions on Microwave Theory and Techniques ,2005,47 ( 12 ) :2242-2243.
  • 6Mitov I P. Spectral Analysis of Heart Rate Variability Using the Integral Pulse Frequency Modulation Model[J]. Medical and Biological Engineering and Computing ,2001,39 ( 3 ) :348-350.
  • 7Tse D N C, Hanly S V. Multi-access Fading Channels: Delay-limited Capacities : J ]. Information Theory, 1998, 10(1) :1109-1110.
  • 8Khan J Y, Li Yifan, Block Reservation Time Division Multiple Access (BRTDMA) Protocol for a High Capacity Wireless Network I J ]. International Journal of Wireless Information Networks, 2000,7 ( 4 ) :211-220.
  • 9Zhang Jianguo,Sharma A B. High-speed Optical Time- division Multiple-access (OTDMA) Networks Using Optical Signal Processing : J ]. Photonic Network Communications, 1999,4 ( 1 ) :273-285.
  • 10Padhi S K, Karmakar N C, Law C L. Dual Polarized Reader Antenna Array for RFID Application E J ]. Antennas and Propagation Society International Symposium,2003,10(4) :265-266.

二级参考文献34

  • 1余松森,詹宜巨,彭卫东,赵振宇.基于后退式索引的二进制树形搜索反碰撞算法及其实现[J].计算机工程与应用,2004,40(16):26-28. 被引量:69
  • 2鞠伟成,俞承芳.一种基于动态二进制的RFID抗冲突算法[J].复旦学报(自然科学版),2005,44(1):46-50. 被引量:42
  • 3吴永祥.射频识别(RFID)技术研究现状及发展展望[J].微计算机信息,2006(11Z):234-236. 被引量:119
  • 4[1]A.Juels,RFID Security and Privacy:A Research Survey,IEEE Journal on Selected Areas in Communications,Vol.24,No.2,February 2006,381-391
  • 5[2]http://www.ccw.com.cn/news2/securo/htm2003/20030828-13T9U.htm
  • 6[3]A.Juels:Yoking-Proofs for RFID Tags,Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops 2004
  • 7[4]S.E.Sarma,S.A.Weis,D.W.Engels:Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2-9
  • 8[5]S.A.Weis,S.E.Sarma,R.L.Rivest,D.W.Engels:Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D.,Miler G.,Stephan W.,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201-212
  • 9[6]A Juels.,R.L.Rivest,M.Szydlo:The blocker tag:Selective blocking of RFID tags for consumer Privacy.In:Proceeding of the 10th ACM Conference on Computer and Communication Security (CCS2003),Washington,DC,USA,2003,103-111
  • 10[8]A Juels,R Pappu,S.Euros:Privacy Protection in RFID-enabled Banknotes,Financial Cryptography' 03,2003.134-145

共引文献241

同被引文献94

引证文献10

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部