2017
DOI: 10.1051/matecconf/201712502009
|View full text |Cite
|
Sign up to set email alerts
|

Simulator for testing hardware and software of the office system with RFID tags

Abstract: Abstract. This paper presents the method for examining the properties of the RFID-tagged document management system. The system is composed of computers, where the software for supporting processes of the RFID-tagged documents was installed. Furthermore, the system cooperates with many other elements of the office (cabinets, sluices, copiers, try rider, end so one). The examination of the properties of the RFID-tagged document management system is, in this case, complex due to the number of a possible examinat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Ready-to-use simulators allow researchers to verify new ideas in a virtual environment without the need to use any hardware. There are several dozen of currently available simulators [4], [5], [6], [7], [12]. In the vast majority cases the simulators focus on wireless communication aspects and resources management and are restricted to hardware platforms.…”
Section: Software Tool For Modelling and Simulation Dos Threatsmentioning
confidence: 99%
See 2 more Smart Citations
“…Ready-to-use simulators allow researchers to verify new ideas in a virtual environment without the need to use any hardware. There are several dozen of currently available simulators [4], [5], [6], [7], [12]. In the vast majority cases the simulators focus on wireless communication aspects and resources management and are restricted to hardware platforms.…”
Section: Software Tool For Modelling and Simulation Dos Threatsmentioning
confidence: 99%
“…This is of particular importance for systems deployed in restricted access administrative offices (military, government etc.) where the following IoT devices are implemented as RFID components [4]:…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation