CALL FOR PAPERS Special Issue of Journal of Network and Computer Applications on

“RFID Technology, Systems, and Applications” http://www.elsevier.com/locate/jnca

Scope: Guest Editors: Dr. Michael Sheng School of Computer Science The University of Adelaide, Australia Email: [email protected] Dr. Sherali Zeadally Department of Computer Science and Information Technology , University of the District of Columbia, USA Email: [email protected] Dr. Katerina Mitrokotsa Department of Mediamatics Technical University of Delft The Netherlands Email: [email protected] Dr. Zakaria Maamar College of Information Technology Zayed University, U.A.E Email: [email protected]

Important Dates: Paper submission: 31 October, 2009 Acceptance notification: 31 January, 2010 Final papers: 30 March, 2010 Publication: Third Quarter 2010

Submission Guideline: All manuscripts and any supplementary material should be submitted through Elsevier Editorial System (EES). The authors must select “SI: RFID – Zeadally” when they reach the “Article Type” step in the submission process. The EES website is located at http://ees.elsevier.com/jnca/

Radio Frequency Identification (RFID) has been around for more than half a century. It is only in recent years that this technology has begun to attract a lot of attention, due to the convergence of lower cost and increased capabilities of RFID tags. Currently, RFID is emerging as an important technology for revolutionizing a wide range of applications including supply chain management, retail, anti-counterfeiting, baggage handling, and healthcare. Many organizations are planning or have already exploited RFID in their main operations to take advantage of the potential of more automation, efficient business processes, and inventory visibility. While RFID provides promising benefits such as inventory visibility and business process automation, significant challenges on information systems and technologies need to be overcome before these benefits can be realized. This special issue will present the latest developments, trends, industrial applications, and research challenges for RFID technology. This issue will explore how organizations can gain competitive advantages by applying RFID technology in real-world settings. Submissions on studies which demonstrate RFID techniques for specific application problems are encouraged. Survey articles that emphasize research and application in a particular RFID domain are welcomed. Research areas of relevance would therefore include, but not only limited to, the following topics: • • • • • • • • • • • •

Data management issues in RFID applications RFID and physical user interfaces Security/privacy and RFID RFID and sensor networks Web services and RFID RFID case studies, field trials, industrial applications RFID middleware and Integration of RFID with other applications Next generation RFID technologies and RFID standards Commercial experience with RFID RFID network management COTS and Open Source RFID infrastructure Performance evaluation of RFID systems and applications

Submission Format: The submitted papers must be written in English and describe original research which is not published nor currently under review by other journals or conferences. Author guidelines for preparation of manuscript can be found at www.elsevier.com/locate/jnca. For more information, please contact the Editorin-Chief, Mohammed Atiquzzaman ([email protected] )

RFID Technology, Systems, and Applications

Information Technology , University of ... College of Information Technology ... advantage of the potential of more automation, efficient business processes,.

67KB Sizes 3 Downloads 258 Views

Recommend Documents

RFID Technology, Systems, and Applications
Information Technology , University of ... College of Information Technology ... advantage of the potential of more automation, efficient business processes,.

Communications systems for radio frequency identification (RFID)
Sep 21, 2007 - cationiThe. Authors Homepage of the RFID Handbook,” located at ..... Next, the interrogator set AMASK to 0001 and AVALUE to 0000 and ...

Communications systems for radio frequency identification (RFID)
Sep 21, 2007 - See application ?le for complete search history. (56). References Cited ... AutoilD Center, Massachusetts Institute of Technology,. “13.56 MHZ ISM ... interrogator, and a plurality of Wireless identi?cation devices con?gured to ...

Communications systems for radio frequency identification (RFID)
Sep 21, 2007 - AutoilD Center, Massachusetts Institute of Technology,. “13.56 MHZ ... interrogator, and a plurality of Wireless identi?cation devices con?gured ...

Design of SoC for Network Based RFID Applications
Apr 17, 2009 - Figure 5.11: Slight physical delay in assignament at clock edge after .... non-zero possibility of absence of peer nodes in the wireless range ... circuit, and technology resulted in three orders of magnitude power savings for.

Design of SoC for Network Based RFID Applications
Figure 3.4: Power Savings in UDP and IP modules by datapath optimiza- tion algorithm . ...... Product Version: ISE 9.2i. ○ Updated: Fri Apr 17 22:32:42 2009.

Electronic Nose Technology and its Applications - International ...
Aug 25, 2009 - active- polymer coated sensor- unique digital electronic fingerprint of ..... by producing a unique electronic aroma signature pattern (EASP) ...

Membrane Technology and Applications 2nd Edition.pdf ...
3. Whoops! There was a problem loading this page. Retrying... Main menu. Displaying Membrane Technology and Applications 2nd Edition.pdf. Page 1 of 50.

34.RFID Technology for IoT-Based Personal.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 34.

Anti-Theft Security System Using GSM, GPS, RFID Technology ... - IJRIT
³ Head of the Department (Digital Systems Computer Applications), SLC's ..... using the Keil uVision integrated development environment, we must select a chip.

Return-Oriented Programming: Systems, Languages, and Applications
systems, has negative implications for an entire class of security mechanisms: those that seek to prevent malicious ... understood that W⊕X is not foolproof [Solar Designer 1997; Krahmer 2005; McDonald. 1999], it was thought to be a ..... The remai