2016
DOI: 10.1051/matecconf/20167604012
|View full text |Cite
|
Sign up to set email alerts
|

Software simulator for property investigation of document management system with RFID tags

Abstract: Abstract. The study outlines the method for examining the properties of the RFID-tagged document management system. The system is composed of computers, where the software for supporting processes of the RFID-tagged documents was installed. Furthermore, the system cooperates with many other elements of the secret office (cabinets, sluices, photocopiers, desks). The examination of the properties of the RFID-tagged document management system is, in this case, complex due to the number of a possible examination s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
4
4

Relationship

3
5

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…The basic property of the proposed solution is a simulated methodology of RFID document management, document access control and copy control [28,29,30,31], as well as the management of authorized people access. An additional advantage of the designed solution, besides ensuring the process of verifying the correctness of the office system software with documents with RFID tags, will ensure the possibility of rapid testing.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The basic property of the proposed solution is a simulated methodology of RFID document management, document access control and copy control [28,29,30,31], as well as the management of authorized people access. An additional advantage of the designed solution, besides ensuring the process of verifying the correctness of the office system software with documents with RFID tags, will ensure the possibility of rapid testing.…”
Section: Discussionmentioning
confidence: 99%
“…It also allows you to carry out these property studies in a short time for a number of test scenarios. The use of RFID tags (radio-frequency identification) for various types of applications is presented in [10], [30]- [34]. The application of this technology is found in numerous branches of the economy, including in the state administration [17] as well as in other organizations [6], including logistics [27] and [26], manufacturing [2], medical [11] .…”
Section: Introductionmentioning
confidence: 99%
“…The model present a closed cycle of the process management, where the processes should be all the time modified and upgraded. The developed processes may be automated, analyzed and explored through the process automation systems (workflow systems) (Fig.2) [1,3], [5][6][7][8][9][10], [17][18][19][20][21][22][23][24][25][26], [28,33]. The use of the process warehouse, including process exploration, makes it possible to perform an in-depth analysis of the processes gathered in the warehouse [7,8], by applying special tools for process exploration, which may use various methods, e.g.…”
Section: Systems Analysis Of Business Processesmentioning
confidence: 99%
“…Simulators should have high reliability [4]. An enormous flow of data during simulation has to be analyzed [5,6,7]. The performance of modern personal computers allows to build increasingly more graphically advanced products.…”
Section: Introductionmentioning
confidence: 99%