期刊文献+

基于UHF RFID的特种设备管理系统的开发 被引量:2

Development of Special Equipment Management System Based on UHF RFID
下载PDF
导出
摘要 传统的特种设备管理通过手工来确认和记录。因此效率低下且不可靠。随着信息化技术在特种设备管理领域的进展,特种设备管理系统应能主动识别设备,包括它们的位置和维修保养记录等。为了实现这个目标,结合RFID和数据库技术,开发了一套特种设备管理系统,可以通过RFID卡实现设备的即时识别以及获得该设备其他相关的信息。该系统的用户界面使用Visual C#2008和Embedded Visual C++实现,并进行了一系列的实验。系统测试达到预期目标。该管理系统解决方案具有很高的管理效率和很低的应用成本,可较易扩展到如仓库管理、资产管理等应用中。 Traditional special equipment management identifies and records by hand,which is inefficient and unreliable.As the development of information technology in special equipment management area,new management system should identify equipment proactively,including their locations and records of maintenance.For this purpose,this paper proposes a set of special equipment management system based on RFID and database technology,which can realize identifying equipment and accessing its relevant information in real time.The system interface is implemented in Visual C# 2008 and embedded Visual C++.A set of experiments are conducted and the effect achieves the design target.
作者 陈梦凌
出处 《工业控制计算机》 2012年第2期57-58,共2页 Industrial Control Computer
关键词 UHF RFID 特种设备管理系统 嵌入式控制系统 UHF RFID special equipment management system embedded control systems
  • 相关文献

参考文献3

二级参考文献33

  • 1任建国.安全评价操作实务讲座(一) 安全评价的起源及发展[J].劳动保护,2005(4):38-39. 被引量:2
  • 2秦庭荣,陈伟炯,郝育国,江建华,李创.综合安全评价(FSA)方法[J].中国安全科学学报,2005,15(4):88-92. 被引量:54
  • 3门智峰,张彦朝.特种设备的风险评估技术[J].中国安全生产科学技术,2006,2(1):92-94. 被引量:30
  • 4[1]王秦平,等.特种设备安全监察研究[M].北京:中国计量出版社,2006.
  • 5Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 6Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 7Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 8Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 9Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 10Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219

共引文献241

同被引文献9

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部