Assignment 3 – Annotated Bibliography
1) Near Field Communication and its application in various fields. Gopichand, G., Chaitanya, T. K., & Kumar, R. R. (2013). Near Field Communication and Its Applications in Various Fields. International Journal of Engineering Trends and Technology, 4(4), 5.
The article reflects the evaluation of networking and communication technologies within a short range. The Near Field communication comprises of solar panels, load controllers, and wireless networks. Near field communication is an emerging technology that comprise of contact less communication in the society. This kind of communication enables the user to surf the device such as tablets or smart phones over Near Field Compatible gadget to send information rather than touching the devices. The NFC uses an electromagnetic radio fields to send information. The NFC devices communicate with wireless technologies such as Bluetooth. The authors state that the NFC is a unique method of technology due to its self-capability of monitoring individual devices. On the other, the article highlights the technical difficulties that need to be addressed by the Information technicians. The authors discuss the NFC applications in the medical field particularly on biomedical monitoring, heart rate devices, and implantable medical services. Additionally, the NFC devices assist children adopt their language and speech through nonverbal communications. Therefore, it helps children make use of visual representation to communicate to other people. The article recognizes some platforms such as Apple, Blackberry, and Google that apply Near Field Communication to enhance security and integrity of information.
2) Mobile computing/Raj Kamal .Raj Kamal 1949.2nd ed New Delhi:Oxford University Press,2012
The book describes a mobile computing as variety of strategies that enable individuals to access information and data from any location. The author refers mobile computing as a human computer interaction. The mobile computing devices transport voice, video, and data over network through a mobile device. Mobile computing is essential because it connects people all the time as well as enhance social engagement through the Internet. This method of technology supports mobility of computer users. Therefore, it allows people to play and work at anywhere despite the time and location. The author targets his audience who are language educators. Therefore, he describes the applications and developments of mobile computing in laptops, mobiles phones and other wireless devices. The mobile computing is important in the computer field as well as education. The importance of the technology is to enhance the language input skills for the users. Therefore, people can communicate through Facebook and text chat .The mobile computing supports disconnected operations and wireless communications. Furthermore, it manages data for users due to its security and reliability. On the other hand, the author discusses the computing environment which is characterized by low transmissions speed, memory limitations, and limited computer power. Consequently, in future the mobile computing devices will be affordable to everyone.
3) Conditional Privacy preserving security protocol for NFC applications(near field communication)(Technical Report). Eun, H., Lee, H., & Oh, H. (2013). Conditional privacy preserving security protocol for NFC applications. IEEE Transactions on Consumer Electronics, 59(1), 153-160.
The book describes the mobile terminals that are equipped with Near Field Communication. Therefore, the combination of these terminals and NFC devices has increased its functions. Additionally, NFC electronic payment supports the electronic payments to secure the information. Therefore, anyone who tries to hack information regarding tot the NFC electronic payment is exposed to the public. Communication protocol comprise of entities that transmit data and information through difference of physical factors such as semantics,syntax,and organization of communication. The conditional privacy protection approaches solves the hackers problems in the nation. The Protocol data Unit conditions the privacy of public users. Consequently, the user informs the receiving party about the protocol of communication as a result, the conditional privacy is preserved via NFC terminals. The emerging technology is important because it minimizes cost as well as manages the NFC physical features. The conditional privacy communication enhances service discovery, data exchange, ticketing, and e-payments. The NFC payments services shall increase due to the widened global markets.
4) Klaus, F. (2003). RFID handbook: Fundamentals and applications in contactless smart cards and identification. Hardcover.
The Radio Frequency Identification allows contactless identification using the Radio Frequency of objects. The author states that the contactless identification secures the Internet payment systems. Additionally, it generates and controls the industrial automation. The RFID emerging technology focuses on development and research departments. Consequently, it has contributed to safe traffic signals for emergency vehicles. As a result, it provides technology for contactless smart cards. Moreover, it ‘auto pilots’ cars hence, enhance production automation. Individuals use the contactless smart cards to access updated information concerning development of smart label. The RFID technologies support the common algorithms for architectures and electron data carriers. The contactless identification enhances e-commerce and document tracking. Therefore, it is important to embrace the contactless identification because it will enhance contactless future ticketing. The practitioners such as electronics computers and transport engineers benefit from the RFID technology. The smart cards handle sensitive data and information such as personal health, finances, and identity. The users can apply the smart cards in financial corporations, entertainment, transportation, and health care services. The increased research and development play an important role to develop smart cards and contactless identification.
5) Thomas, J. A. (2004). Echolocation in bats and dolphins. University of Chicago Press.
Jeannette Thomas writes about echolocation in bats and dolphins in their different environments. The book covers the methodologies and theoretical topics of seals, shrews, and whales. The echolocation technology assists scientists to navigate seas and skies. Additionally, it helps to locate food for the water mammals and bats. Additionally, they are in a position to identify the physiology and anatomy of these mammals thorough signal reception as well as interpretation. The ecologists, physiologists, and scientists in the bioacoustics filed benefit from the book. The emerging technology assists scientists to locate animals and objects living in water. Therefore, this approach is important because it protects animals from predators by emitting sounds. The whales and dolphins can determine the size and location of objects through echolocation. Therefore, they responds towards the objects direction and distance. The author compares echolocation of the bats and dolphins despite their different environments. Hence, the book identifies the specific characteristics of the animals for echolocation. The writer puts across the different environments that bats and dolphins navigate through signal and waves. Therefore, scientists are in a position to protect animals from extinction through echolocation. It is important to protect them from predators and also locate food for both bats and dolphins.
6) Michahelles, F., Thiesse, F., Schmidt, A., & Williams, J. R. (2007). Pervasive RFID and near field communication technology. IEEE Pervasive Computing, 6(3), 94-96.
The Pervasive RFID is a technology that manages data ownership for supply chains through integration of RFID, privacy, sensors, and security. The RFID provides security methods starting from ID coding to cryptography. Furthermore, it offers cost effective solutions depending on the products value. Additionally, pervasive RFID allows users to track objects simultaneously. The conference, the authors proposed that the end users for Near Field Communications will build infrastructure and tools for RFID tags. The society should embrace this technology because it will improve its security concerns. Additionally, pervasive RFID offers the track and trace remedies for the nation. Consequently, pervasive technology enable individuals to communicate with objects. The founders communicate that the RFID future evolution shall offer good identification applications, integration of sensors, NFC application, and localizations. The supply chain elements benefit from pervasive RFIDS due to the fact that their goods are easily tracked by the RFIDS. Moreover, they can trace and track their goods despite the different locations. Pervasive RFIDs can be used in the transport sectors as well as security stations.
7) Dieng, M., Comte, M., Bernard, S., Kerzerho, V., Azaïs, F., Renovell, M., ... & Pugliesi-Conti, P. H. (2013, June). Accurate and efficient analytical electrical model of antenna for NFC applications. In New Circuits and Systems Conference (NEWCAS), 2013 IEEE 11th International (pp. 1-4). IEEE.
The technology of antenna simulation and design for NFC applications enhance wireless communications. They link between the ether and contained signal for communication. The antennae do not operate in isolation therefore they are attached to feed network. Furthermore, the antennas have electromagnetic waves that absorb incident waves from the surface. Tablets and smart phones contain wireless systems such as WIFI, GPS, and cellular. The simple geometry maintains the antenna model efficiently and accurately. The final simulation of antennae model represent accurate designs as a result, enhance the antennae performance. The antennas models are applicable in the computer field and automotive market. The society should apply this technology because it improves safety, utility, and entertainment. Additionally, it increases communication speed for consumers. The antenna completes both the interface functionality, electromagnetic compatibility, and mechanical integration. Consequently, the antennae models assists manufacturers to customize the requirements of customers. As a result, firms gain a competitive edge over other industries. The society should appreciate the applications of the antennae models for the reason that it helps people communicate easily with physical objects.
8) Coskun, V., Ozdenizci, B., & Ok, K. (2013). A survey on near field communication (NFC) technology. Wireless personal communications, 71(3), 2259-2294.
Coskun carried out a survey on the Near Field Communications that enhances wireless personal communication. The author provides the readers the readers with information relating to shopping experiences using the wireless communication devices. Therefore, the wireless devices apply the signal blocking technology to make shopping user friendly as well as effective for consumers. In some stores, the suppliers install WIFI for tracking their goods within and outside the stores. Additionally, the technology device records the amount of time that a customer takes in the store at a specific location. Therefore, the wireless communication enabled by the Near Field Communication creates shopping experiences such as Amazon. Additionally, the selling sites recommend products for the both on-line and off-line shoppers. Furthermore, the wireless communication help buyers to locate gods and services inside and outside the stores. The society should increase the use of wireless communication since it improves the purchasing power of consumers. The emerging technology is efficient and saves time for consumers.
9) Juels, A., & Weis, S. A. “Defining Strong Privacy for RFID,” ACM Transactions on Information and System Security 13 (2009): 7-26. Accessed 11 March 2014. http://eprint.iacr.org/2006/137.pdf
The emergent technology known as “Defining Strong Privacy for RFID” provides the world with new definitions privacy that are valid to RFID systems. Additionally, the multi-verifier system rely on the defined privacy for protection. On the hand, these system do not met the simple and new definitions of privacy, therefore, they are open to potential vulnerabilities. The “Hash-Locks” are protocol improvements for literature. The defined privacy captures the RFID protection and encryptions in the real world applications. The defining strong privacy enhances protection of data and information .Consequently, it has signal blocking fabrics that protects sensitive information from manipulation. Surprisingly, the author states that this technology is applicable in security and education fields. Additionally, the government shall use the technology for future purposes with the aim of protecting their information. For the society purposes, the criticisms for define strong privacy is reliable and applicable for data confidentiality. The author concludes with scope of invention, implication, summary, and how it fits into end users lives.
10) Yao, W., Chu, CH., Li, Z. “The Adoption and Implementation of RFID Technologies in Healthcare: A Literature Review,” Journal of Medical Systems 36 (2012): 3507-3525. Accessed 11 March 2014. http://dl.acm.org/citation.cfm?id=2387089
The author gives attention to adoption of this emergent technology especially for the health care sector. The authors highlight factors that will influence technology in the medical field. Additionally, they provide an analysis of both advantages and arguments of RFID tagging in the health care. RFID technology is a cost effective and efficient approach of solving health care problems and failures. The society reports increasing medical costs, medical mistakes, drug counterfeit, inefficient work flow, and theft loss. Therefore, the technology shall track the lost equipment, verification and identification of patients, sensors for biometrics and logistics, and surgery triggers for patients. Furthermore, this technology improves medical procedures and enhance automated care. Consequently, the adoption of this technology is achieved through tactical and strategic factors. The tactical factors start with customized projects to integrate with existing information and technology infrastructure. As a result, the medical physicians can have effective communication among themselves and patients throughout. The strategic factors target the top level management to achieve the health care goals and objectives. Furthermore, it considers confidentiality and privacy of health care data.
11) YouTube. “SHIELDON RF BLOCKING Fabrics (128,225,240).” Accessed 26 March 2014. http://www.youtube.com/watch?v=ZsmDEj09l4A&feature=youtu.be
The YouTube exhibits the process of a particular product that blocks signals over different fabrics known as RF Blocking that reduces signal frequency. Unfortunately, this visual exhibition fails to highlight the process of lowering rates to the audience. Additionally, it does not reflect if the rates change, when the fabrics are organized in a different approach. However, this video demonstrates the contribution of the signal reader and radio signals. Consequently, the video applies different fabrics for testing the ability to lower rates. Notably, it is significant since the viewers can visit the company’s website with the aim of choosing the strong fabrics that block emitted signals. It is relevant for the society to apply the emergent technology, Shieldon to lower radio signals. The device is applicable in medical and computer field.
12) Srinivasan, S., Aggarwal, A., & Kumar, A. “RFID Security and Privacy Concerns,” WSEAS Transactions on Communications 5 (2006): 296-301. Accessed 11 March 2014. http://www.wseas.us/e-library/conferences/2005tenerife/papers/502-780.pdf
The author who is the earliest contributor for RFID socio technical issues, therefore, he outlines the past account of RFID technology. Additionally, he expounds its impacts and capabilities on security and privacy. The article offers a quick review of RFID system that comprise of reader, antennae, and transponder. Additionally, the article highlights different types of RFID tags such as semi passive, passive, and active. The RFID benefits consumers and businesses specifically in retail shopping, E-passports, automobile toll responders, health care, and smart appliances. The author highlights privacy concerns and confidentiality of information and data. The RFID technology secures peoples data and information. Therefore, it protects people’s information as well as their private properties. Moreover, the article provides two ways of countering security concerns such as deactivating tags after sale, encrypting tags for privacy and confidentiality. The technology protects people from data manipulation and exposure. The financial and health information is confidential, as a result, the society should account for privacy. The author is criticized by engineers regarding to his research however, his literature gains support from the readers.
References
Near Field Communication and its application in various fields. Gopichand, G., Chaitanya, T. K., & Kumar, R. R. (2013). Near Field Communication and Its Applications in Various Fields. International Journal of Engineering Trends and Technology, 4(4), 5.
Mobile computing/Raj Kamal .Raj Kamal 1949.2ndEd New Delhi: Oxford University Press, 2012
Conditional Privacy preserving security protocol for NFC applications(near field communication)(Technical Report). Eun, H., Lee, H., & Oh, H. (2013). Conditional privacy preserving security protocol for NFC applications. IEEE Transactions on Consumer Electronics, 59(1), 153-160.
Klaus, F. (2003). RFID handbook: Fundamentals and applications in contactless smart cards and identification. Hardcover.
Thomas, J. A. (2004). Echolocation in bats and dolphins. University of Chicago Press.
Michahelles, F., Thiesse, F., Schmidt, A., & Williams, J. R. (2007). Pervasive RFID and near field communication technology. IEEE Pervasive Computing, 6(3), 94-96.
Dieng, M., Comte, M., Bernard, S., Kerzerho, V., Azaïs, F., Renovell, M., ... & Pugliesi-Conti, P. H. (2013, June). Accurate and efficient analytical electrical model of antenna for NFC applications. In New Circuits and Systems Conference (NEWCAS), 2013 IEEE 11th International (pp. 1-4). IEEE.
Coskun, V., Ozdenizci, B., & Ok, K. (2013). A survey on near field communication (NFC) technology. Wireless personal communications, 71(3), 2259-2294.
Juels, A., & Weis, S. A. “Defining Strong Privacy for RFID,” ACM Transactions on Information and System Security 13 (2009): 7-26. Accessed 11 March 2014. http://eprint.iacr.org/2006/137.pdf
Yao, W., Chu, CH., Li, Z. “The Adoption and Implementation of RFID Technologies in Healthcare: A Literature Review,” Journal of Medical Systems 36 (2012): 3507-3525. Accessed 11 March 2014. http://dl.acm.org/citation.cfm?id=2387089
YouTube. “SHIELDON RF BLOCKING Fabrics (128,225,240).” Accessed 26 March 2014. http://www.youtube.com/watch?v=ZsmDEj09l4A&feature=youtu.be
Srinivasan, S., Aggarwal, A., & Kumar, A. “RFID Security and Privacy Concerns,” WSEAS Transactions on Communications 5 (2006): 296-301. Accessed 11 March 2014. http://www.wseas.us/e-library/conferences/2005tenerife/papers/502-780.pdf
Agrawal, P., & Bhuraria, S. (2012). Near field communication. SETLabs Bridfings, 10(1), 67-74.
Zimmerman, T. G. (1996). Personal area networks: near-field intrabody communication. IBM systems Journal, 35(3.4), 609-617
Want, R. (2011). Near field communication. IEEE Pervasive Computing, 10(3), 4-7.
Curran, K., Millar, A., & Mc Garvey, C. (2012). Near field communication. International Journal of Electrical and Computer Engineering, 2(3), 371.