Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (700)

Search Parameters:
Keywords = RFID identification

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 404 KB  
Review
Recent Development on Sorting of Textiles Waste by Fibre Type for Recycling: A Mini Review
by Megan Robinson, Saikat Ghosh, Feng Qian, Chenyu Du, Mauro Vallati and Parikshit Goswami
Textiles 2026, 6(1), 28; https://doi.org/10.3390/textiles6010028 - 2 Mar 2026
Viewed by 234
Abstract
With the rapid expansion of the global textile sector and increasing awareness of the environmental pollution caused by textile waste, enhancing the recycling of textile waste has become essential to reduce the volume of materials sent to landfill or incineration. As recycling technologies [...] Read more.
With the rapid expansion of the global textile sector and increasing awareness of the environmental pollution caused by textile waste, enhancing the recycling of textile waste has become essential to reduce the volume of materials sent to landfill or incineration. As recycling technologies advance, automated sorting systems that are capable of handling large waste streams and accurately identifying materials for appropriate recycling pathways are increasingly recognised as being critical for efficient textile-waste management. Since 2015, over 20 studies have specifically explored technologies and strategies for automating textile sorting of textile wastes. This mini review introduces various textile fibre identification technologies, including traditional visual and tactile examination; label checking and modern identification technology; and NIR, FT-IR, RFID tags. It summarises the current state of sorting processes, with particular emphasis on the development of AI-assisted, fibre-type-based sorting technologies. Commercial scale automated sorting is not established yet for textile waste recycling, due to the complexity of materials used in textiles, the equipment identification limits and high cost of processing, while machine learning and artificial neural networks provide opportunities for future research advancement and commercialisation. Full article
Show Figures

Figure 1

42 pages, 2328 KB  
Review
Artificial Neural Network Applications in Supply Chain Management: A Literature Review and Classification
by Iman Ghalehkhondabi
Appl. Syst. Innov. 2026, 9(3), 55; https://doi.org/10.3390/asi9030055 - 28 Feb 2026
Viewed by 287
Abstract
Supply Chain Management (SCM) has received considerable attention from the industrial community in recent decades. SCM continues to be an interesting and relevant research topic in many business areas such as revealing supply chain integration benefits, uncertainty and risk mitigation methods, decision-making and [...] Read more.
Supply Chain Management (SCM) has received considerable attention from the industrial community in recent decades. SCM continues to be an interesting and relevant research topic in many business areas such as revealing supply chain integration benefits, uncertainty and risk mitigation methods, decision-making and optimization methodologies, etc. In current supply chain management, huge volumes of data are being developed each second, and emerging technologies such as Radio Frequency Identification (RFID) have amplified the availability of online data. Using Artificial Intelligence (AI) methods that go beyond simply using the huge volume of online data enables Supply Chain (SC) managers to monitor everything in a timely fashion. There are several aspects of an SC that AI—and specifically Artificial Neural Networks (ANNs)—can be applied to better help them manage and optimize. This study aims to review state-of-the-art ANNs and Deep Neural Networks (DNNs) in the field of supply chain management. One hundred high-quality research studies that applied ANNs in supply chain management are reviewed and categorized into four classes: performance optimization, supplier selection, forecasting, and inventory management studies. Our study shows that there is a significant possibility that we could use ANNs and DNNs to better manage supply chains. Across the reviewed studies, neural networks are frequently reported to improve predictive performance and support monitoring/control in complex, nonlinear supply chain settings, often complementing traditional operations research approaches. Finally, the limitations of ANN models and the possibilities for future studies are presented at the end of this study. Full article
(This article belongs to the Section Industrial and Manufacturing Engineering)
Show Figures

Figure 1

38 pages, 10593 KB  
Article
Real-World Experimental Evaluation of DDoS and DRDoS Attacks on Industrial IoT Communication in an Automated Cyber-Physical Production Line
by Tibor Horak, Roman Ruzarovsky, Roman Zelník, Martin Csekei and Ján Šido
Machines 2026, 14(3), 258; https://doi.org/10.3390/machines14030258 - 25 Feb 2026
Viewed by 404
Abstract
Automated production lines are increasingly being expanded with Industrial Internet of Things (IIoT) devices, creating complex Cyber-Physical Systems (CPSs) that connect physical production with control and information infrastructure. However, the convergence of Information Technology (IT) and Operational Technology (OT) layers creates new entry [...] Read more.
Automated production lines are increasingly being expanded with Industrial Internet of Things (IIoT) devices, creating complex Cyber-Physical Systems (CPSs) that connect physical production with control and information infrastructure. However, the convergence of Information Technology (IT) and Operational Technology (OT) layers creates new entry points for attacks targeting communication availability. Most existing studies analyze Distributed Denial of Service (DDoS) attacks primarily in simulation or testbed environments, with limited experimental verification of their impact on real-world production systems. This article presents an experimental evaluation of the impact of DDoS and Distributed Reflection Denial of Service (DRDoS) attacks carried out directly on a physical automated production line with integrated IIoT infrastructure during real operation. Three attack scenarios (TCP SYN flood, TCP ACK flood, and ICMP reflected attack) were implemented, targeting Programmable Logic Controllers (PLCs), Radio-Frequency Identification (RFID) subsystems, and selected IIoT devices. The results showed rapid degradation of deterministic PROFINET communication, disruption of the link between the OT and IT layers, loss of digital product representation, and physical interruption of the production process. Based on the findings, a minimally invasive security solution based on perimeter protection was designed and experimentally verified. The results emphasize the need to design IIoT-based manufacturing systems with an emphasis on network segmentation and architectural separation of the IT and OT layers. Full article
Show Figures

Figure 1

21 pages, 1714 KB  
Article
Lightweight Authentication and Dynamic Key Generation for IMU-Based Canine Motion Recognition IoT Systems
by Guanyu Chen, Hiroki Watanabe, Kohei Matsumura and Yoshinari Takegawa
Future Internet 2026, 18(2), 111; https://doi.org/10.3390/fi18020111 - 20 Feb 2026
Viewed by 239
Abstract
The integration of wearable inertial measurement units (IMU) in animal welfare Internet of Things (IoT) systems has become crucial for monitoring animal behaviors and enhancing welfare management. However, the vulnerability of IoT devices to network and hardware attacks poses significant risks, potentially compromising [...] Read more.
The integration of wearable inertial measurement units (IMU) in animal welfare Internet of Things (IoT) systems has become crucial for monitoring animal behaviors and enhancing welfare management. However, the vulnerability of IoT devices to network and hardware attacks poses significant risks, potentially compromising data integrity and misleading caregivers, negatively impacting animal welfare. Additionally, current animal monitoring solutions often rely on intrusive tagging methods, such as Radio Frequency Identification (RFID) or ear tagging, which may cause unnecessary stress and discomfort to animals. In this study, we propose a lightweight integrity and provenance-oriented security stack that complements standard transport security, specifically tailored to IMU-based animal motion IoT systems. Our system utilizes a 1D-convolutional neural network (CNN) model, achieving 88% accuracy for precise motion recognition, alongside a lightweight behavioral fingerprinting CNN model attaining 83% accuracy, serving as an auxiliary consistency signal to support collar–animal association and reduce mis-attribution risks. We introduce a dynamically generated pre-shared key (PSK) mechanism based on SHA-256 hashes derived from motion features and timestamps, further securing communication channels via application-layer Hash-based Message Authentication Code (HMAC) combined with Message Queuing Telemetry Transport (MQTT)/Transport Layer Security (TLS) protocols. In our design, MQTT/TLS provides primary device authentication and channel protection, while behavioral fingerprinting and per-window dynamic–HMAC provide auxiliary provenance cues and tamper-evident integrity at the application layer. Experimental validation is conducted primarily via offline, dataset-driven experiments on a public canine IMU dataset; system-level overhead and sensor-to-edge latency are measured on a Raspberry Pi-based testbed by replaying windows through the MQTT/TLS pipeline. Overall, this work integrates motion recognition, behavioral fingerprinting, and dynamic key management into a cohesive, lightweight telemetry integrity/provenance stack and provides a foundation for future extensions to multi-species adaptive scenarios and federated learning applications. Full article
(This article belongs to the Special Issue Secure Integration of IoT and Cloud Computing)
Show Figures

Figure 1

15 pages, 3315 KB  
Article
RFID Ultra-High Frequency Tag Antenna Based on SRR Resonant Superstrate
by Zhenhao Huang, Minghan Ke, Haonan Zhang, Lihao Luo, Chaohai Zhang and Guozhi Zhang
Sensors 2026, 26(4), 1233; https://doi.org/10.3390/s26041233 - 13 Feb 2026
Viewed by 248
Abstract
Addressing the pressing need to extend the communication range of RF RFID tag antennas, this paper introduces a novel UHF RFID tag antenna technology based on resonant superstrate regulation using a Split-Ring Resonator (SRR). First, a finite element model of the UHF RFID [...] Read more.
Addressing the pressing need to extend the communication range of RF RFID tag antennas, this paper introduces a novel UHF RFID tag antenna technology based on resonant superstrate regulation using a Split-Ring Resonator (SRR). First, a finite element model of the UHF RFID folded dipole antenna was constructed based on the tag chip’s port impedance. Subsequently, a Two-element SRR resonant superstrate was employed to enhance the dipole antenna’s gain through “resonance and near-field coupling” technology. A folded dipole antenna gain-enhancing SRR resonant superstrate unit was designed, and a multi-parameter joint optimization method was adopted to obtain the optimal SRR resonant superstrate configuration for regulating the dipole antenna. Near-field coupling technology was used to design SRR resonant superstrate elements that enhance the folded dipole antenna’s gain. A multi-parameter joint optimization method was employed to obtain the optimal structural parameter set for the SRR resonant superstrate-controlled dipole antenna. Finally, simulations and experimental measurements of the RFID antenna performance revealed that: within the 920–925 MHz band, the maximum measured forward reading distance enhancement reached 62.1%. The research findings significantly enhance the practical performance of UHF RFID tags in complex environments, enabling more stable and efficient long-range identification in applications such as logistics tracking, asset management, and smart warehousing. Full article
(This article belongs to the Section Electronic Sensors)
Show Figures

Figure 1

18 pages, 6502 KB  
Article
Design of a Passive Distributed RFID-Based Temperature Monitoring System for Grain Storage
by Qiuju Liang, Yuanwei Zhou, Guilin Yu, Zhiguo Wang, Wen Du, Hua Fan, Can Zhu, Zhenbing Li, Tong Yang and Gang Li
Electronics 2026, 15(4), 752; https://doi.org/10.3390/electronics15040752 - 10 Feb 2026
Viewed by 245
Abstract
In grain storage and transportation, biological activity, including respiration and metabolism, generates heat, creating temperature gradients that can induce moisture migration and form high-humidity areas. This accelerates fungal and insect activity, leading to quality degradation. Long-term, distributed temperature monitoring inside grain piles is [...] Read more.
In grain storage and transportation, biological activity, including respiration and metabolism, generates heat, creating temperature gradients that can induce moisture migration and form high-humidity areas. This accelerates fungal and insect activity, leading to quality degradation. Long-term, distributed temperature monitoring inside grain piles is essential for ensuring safe storage and early risk warning. Radio Frequency Identification (RFID) technology has become widely adopted in storage temperature monitoring due to its low cost, maintenance-free operation, and high security. However, traditional RFID systems have limited communication ranges, and the large size of storage facilities necessitates the deployment of multiple readers, which increases costs. Additionally, the high density and fluctuating moisture content of bulk grain lead to significant RF signal absorption and scattering, weakening the accessibility of purely wireless systems to deeper parts of the grain pile. To address these issues, a passive distributed temperature monitoring system based on RFID technology is proposed. The system utilizes RFID readers to harvest RF energy for passive power supply, with an external antenna ensuring stable energy harvesting and data transmission. Single-bus multi-point temperature sensor modules are integrated into the system, enabling distributed temperature measurements across grain piles or warehouses. Experimental results show that the system achieves a temperature collection success rate of 98%, with an accuracy of ±1 °C and a polling cycle of less than 30 s, providing a low-cost, battery-free, and scalable solution for grain storage monitoring, significantly improving storage quality. Full article
Show Figures

Figure 1

28 pages, 1044 KB  
Article
A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm
by Hu Liu, Hengyu Wu, Ning Ge and Qingkuan Dong
Sensors 2026, 26(3), 1038; https://doi.org/10.3390/s26031038 - 5 Feb 2026
Viewed by 276
Abstract
As a non-contact identification technology, RFID (Radio Frequency Identification) is widely used in various Internet of Things applications. However, RFID systems are highly vulnerable to diverse attacks due to the openness of communication links between readers and tags, leading to serious security and [...] Read more.
As a non-contact identification technology, RFID (Radio Frequency Identification) is widely used in various Internet of Things applications. However, RFID systems are highly vulnerable to diverse attacks due to the openness of communication links between readers and tags, leading to serious security and privacy concerns. Numerous RFID authentication protocols have been designed that employ hash functions and symmetric cryptography to secure communications. Despite these efforts, such schemes generally exhibit limitations in key management flexibility and scalability, which significantly restricts their applicability in large-scale RFID deployments. Confronted with this challenge, public key cryptography offers an effective solution. Taking into account factors such as parameter size, computational complexity, and resistance to quantum attacks, the NTRU algorithm emerges as one of the most promising choices. Since the NTRU signature algorithm is highly complex and requires large parameters, there are currently only a few NTRU encryption-based RFID authentication protocols available, all of which exhibit significant security flaws—such as supporting only one-way authentication, failing to address public key distribution, and so on. Moreover, performance evaluations of the algorithm in these contexts are often incomplete. This paper proposes a mutual authentication protocol for RFID based on the NTRU encryption algorithm to address security and privacy issues. The security of the protocol is analyzed using the BAN-logic tools and some non-formalized methods, and it is further validated through simulation with the AVISPA tool. With the parameter set (N, p, q) = (443, 3, 2048), the NTRU algorithm can provide 128 bits of post-quantum security strength. This configuration not only demonstrates greater foresight at the theoretical security level but also offers significant advantages in practical energy consumption and computation time when compared to traditional algorithms such as ECC, making it a highly competitive candidate in the field of post-quantum cryptography. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

23 pages, 5335 KB  
Article
Design of a Low-Power RFID Sensor System Based on RF Energy Harvesting and Anti-Collision Algorithm
by Xin Mao, Xuran Zhu and Jincheng Lei
Sensors 2026, 26(3), 1023; https://doi.org/10.3390/s26031023 - 4 Feb 2026
Viewed by 296
Abstract
Passive radio frequency identification (RFID) sensing systems integrate wireless energy transfer with information identification. However, conventional passive RFID systems still face three key challenges in practical applications: low RF energy harvesting efficiency, high power consumption of sensor loads, and high complexity of tag [...] Read more.
Passive radio frequency identification (RFID) sensing systems integrate wireless energy transfer with information identification. However, conventional passive RFID systems still face three key challenges in practical applications: low RF energy harvesting efficiency, high power consumption of sensor loads, and high complexity of tag anti-collision algorithms. To address these issues, this paper proposes a hardware–software co-optimized RFID sensor system. For hardware, low threshold RF Schottky diodes are selected, and an input inductor is introduced into the voltage multiplier rectifier to boost the signal amplitude, thereby enhancing the radio frequency to direct current (RF-DC) energy conversion efficiency. In terms of loading, a low-power management strategy is implemented for the power supply and control logic of the sensor node to minimize the overall system energy consumption. For algorithmic implementation, a Dual-Threshold Stepped Dynamic Frame Slotted ALOHA (DTS-DFSA) anti-collision algorithm is proposed, which adaptively adjusts the frame length based on the observed collision ratio, eliminating the need for complex tag population estimation. The algorithm features low computational complexity and is well suited for resource constrained embedded platforms. Through simulation validation, we compare the conversion efficiency of the RF energy harvesting circuit before and after improvement, the current of the sensor load in active and idle states, and the performance of the proposed algorithm against the low-complexity DFSA (LC-DFSA). The results show that the maximum conversion efficiency of the improved RF energy harvesting circuit has increased from 60.56% to 68.69%; specifically, the sensor load current drastically drops from approximately 2.0 mA in the active state to around 74 μA in the idle state, validating the efficacy of the proposed power gating strategy, and the proposed DTS-DFSA algorithm outperforms existing low-complexity schemes in both identification efficiency and computational complexity. Full article
(This article belongs to the Topic Advanced Energy Harvesting Technology, 2nd Edition)
Show Figures

Graphical abstract

23 pages, 11674 KB  
Article
High-Precision Individual Identification Method for UAVs Based on FFS-SPWVD and DIR-YOLOv11
by Jian Yu, Mingwei Qin, Liang Han, Song Lu, Yinghui Zhou and Jun Jiang
Electronics 2026, 15(3), 680; https://doi.org/10.3390/electronics15030680 - 4 Feb 2026
Viewed by 320
Abstract
As the threat from malicious UAVs continues to intensify, accurate identification of individual UAVs has become a critical challenge in regulatory and security domains. Existing single-signal analysis methods suffer from limited recognition accuracy. To address this issue, this paper proposes a high-precision individual [...] Read more.
As the threat from malicious UAVs continues to intensify, accurate identification of individual UAVs has become a critical challenge in regulatory and security domains. Existing single-signal analysis methods suffer from limited recognition accuracy. To address this issue, this paper proposes a high-precision individual identification method for UAVs based on FFS-SPWVD and DIR-YOLOv11. The proposed method first employs a frame-by-frame search strategy combined with the smoothing pseudo-Wigner–Ville distribution (SPWVD) algorithm to obtain effective time–frequency feature representations of flight control signals. Building on this foundation, the YOLOv11n network is adopted as the baseline architecture. To enhance the extraction of time–frequency texture features from UAV signals in complex environments, a Multi-Branch Auxiliary Multi-Scale Fusion Network is incorporated into the neck network. Meanwhile, partial space–frequency selective convolutions are introduced into selected C3k2 modules to alleviate the increased computational burden caused by architectural modifications and to reduce the overall number of model parameters. Experimental results on the public DroneRFb-DIR dataset demonstrate that the proposed method effectively extracts flight control frames and performs high-resolution time–frequency analysis. In individual UAV identification tasks, the proposed approach achieves 96.17% accuracy, 97.82% mAP50, and 95.29% recall, outperforming YOLOv11, YOLOv12, and YOLOv13. This study demonstrates that the proposed method achieves both high accuracy and computational efficiency in individual UAV recognition, providing a practical technical solution for whitelist identification and group size estimation in application scenarios such as border patrol, traffic control, and large-scale events. Full article
Show Figures

Figure 1

20 pages, 555 KB  
Systematic Review
Ensuring Safe Newborn Delivery Through Standards: A Scoping Review of Technologies Aligned with Healthcare Accreditation and Regulatory Frameworks
by Abdallah Alsuhaimi and Khalid Saad Alkhurayji
Healthcare 2026, 14(3), 377; https://doi.org/10.3390/healthcare14030377 - 2 Feb 2026
Viewed by 331
Abstract
Background/Objectives: Safe delivery and correct identification of newborns are critical aspects of healthcare systems globally. The accreditation of healthcare and standards regulation significantly promotes the adoption of modern technologies to address risks related to infant abduction and misidentification. The effectiveness and extent of [...] Read more.
Background/Objectives: Safe delivery and correct identification of newborns are critical aspects of healthcare systems globally. The accreditation of healthcare and standards regulation significantly promotes the adoption of modern technologies to address risks related to infant abduction and misidentification. The effectiveness and extent of these mandates vary across settings and countries. Therefore, this study aims to map and explore modern technologies used for safe newborn delivery and correct identification aligned with healthcare accreditation and regulatory frameworks. Methods: This review adheres to the Preferred Reporting Items for Systematic Review and Meta-Analysis extension for scoping reviews (PRISMA-ScR) guidelines. The Problem, Intervention, Comparison, and Outcome (PICO) framework was employed to facilitate the development of the research question. This study examined studies reporting technologies such as radio frequency identification (RFID), biometric identification, and real-time monitoring across healthcare settings for infant protection through the Normalization Process Theory (NPT). Among three databases and search engines (PubMed, Google Scholar, and Web of Science). The risk of bias for each study was assessed using the AACODS Checklist, SQUIRE 2.0 Checklist, TIDieR Checklist, and JBI tools. Results: Out of 8753 records, only 27 reports were eligible to be included in this review. The most frequently reported technologies were RFID systems (11 studies, 37.9%) and biometric systems such as footprint and facial recognition (6 studies, 20.7%). Despite strong technological potential, many healthcare institutions struggled with the adoption of infant protection technologies. Accreditation systems among the high-resource settings actively mandate advanced technologies and support the integration of staff training and simulation drills. Comparably, middle- and low-income regions usually face challenges related to regulatory enforcement, infrastructure, staff readiness, and limited adoption of modern technologies. Conclusions: Accreditation and standards development are critical catalysts for the adoption of modern infant protection technology. Standards must be comprehensible, adaptable, and supported by investment in human resources and infrastructure. Future regulation must focus on strengthening enforcement, continuous quality improvement, and capacity building to achieve sustainable protection across the world. Full article
Show Figures

Figure 1

23 pages, 3417 KB  
Article
Automatic Inventory of Wiring Harness Components Using UHF RFID Technology
by Ioana Iorga, Cicerone Laurentiu Popa, Constantin-Adrian Popescu, Florina Chiscop, Tiberiu Gabriel Dobrescu and Costel Emil Cotet
Logistics 2026, 10(2), 33; https://doi.org/10.3390/logistics10020033 - 2 Feb 2026
Viewed by 399
Abstract
Background: Integrating Radio Frequency Identification (RFID) technology into storage areas within the wiring harness manufacturing industry enables real-time component traceability and supports the implementation of fully automated inventory processes. While RFID systems provide continuous data regarding component type, quantity, and location, periodic [...] Read more.
Background: Integrating Radio Frequency Identification (RFID) technology into storage areas within the wiring harness manufacturing industry enables real-time component traceability and supports the implementation of fully automated inventory processes. While RFID systems provide continuous data regarding component type, quantity, and location, periodic inventory validation is still required to verify and correct records in the warehouse management system. Methods: This study examines the feasibility of passive ultra-high-frequency (UHF) RFID technology for automatic inventory management in a components warehouse. It also reviews relevant scientific literature on autonomous RFID signal measurement and Synthetic Aperture Radar (SAR)-based localization methods, which are subsequently adapted for inventory applications. An experimental setup is developed to characterize the reading field, hysteresis effects, and the influence of distance and tag orientation on detection performance. Results: The findings indicate that RFID-based automatic inventory is achievable with high accuracy and stability, especially when tag trajectories correspond to areas of high detection probability and antenna polarization is optimally configured. Conclusions: The proposed RFID-based system can be implemented with minimal hardware changes and low investment, thereby improving stock accuracy, traceability, and operational efficiency in automotive component logistics. Full article
Show Figures

Figure 1

16 pages, 2987 KB  
Article
Sustainable Graphene Electromagnetic Shielding Paper: Preparation and Applications in Packaging and Functional Design
by Chaohua Chen, Qingyuan Shi, Wei Chen and Yongjian Huai
Sustainability 2026, 18(3), 1219; https://doi.org/10.3390/su18031219 - 26 Jan 2026
Cited by 1 | Viewed by 287
Abstract
Electromagnetic interference (EMI) shielding materials are essential for ensuring the reliable operation of electronic devices and safeguarding human health, yet conventional metal-polymer materials are non-biodegradable, energy-intensive, and difficult to recycle. This study prepared a biodegradable paper-based shielding material; renewable cellulose filter paper was [...] Read more.
Electromagnetic interference (EMI) shielding materials are essential for ensuring the reliable operation of electronic devices and safeguarding human health, yet conventional metal-polymer materials are non-biodegradable, energy-intensive, and difficult to recycle. This study prepared a biodegradable paper-based shielding material; renewable cellulose filter paper was employed as the sole substrate, and graphene was integrated to construct an electromagnetic shielding network. A low-cost paper-based electromagnetic shielding preparation method was developed, and the performance of the material was analyzed in electromagnetic shielding applications. Samples were fabricated through a simple impregnation-evaporation-lamination process. It has a thickness of 1 mm for single layers and a maximum conductivity of 21.3 S/m. The influence of sample thickness on electromagnetic shielding in the X-band (8.2–12.4 GHz) was investigated, when the graphene filter cake loading reached 20 wt%, the SET values for triple-layer electromagnetic shielding papers reach 36 dB at 8.2 GHz and 33 dB at 12.4 GHz. A phone box for indoor environments and a card holder with anti-radio-frequency identification (RFID) functionality were designed. Furthermore, achievable design solutions for an EMI shielding wallpaper in medical and artistic installations were proposed. Full article
Show Figures

Figure 1

10 pages, 492 KB  
Proceeding Paper
Precision Localization of Autonomous Vehicles in Urban Environments: An Experimental Study with RFID Markers
by Svetozar Stefanov, Valentina Markova and Miroslav Markov
Eng. Proc. 2026, 122(1), 7; https://doi.org/10.3390/engproc2026122007 - 14 Jan 2026
Viewed by 270
Abstract
This paper presents an experimental study validating the feasibility of Radio Frequency Identification (RFID) marker systems as a complementary solution for autonomous vehicle (AV) localization in Global Navigation Satellite System (GNSS)-degraded urban environments. A novel synchronized dynamic testbed featuring hardware-level integration with wheel [...] Read more.
This paper presents an experimental study validating the feasibility of Radio Frequency Identification (RFID) marker systems as a complementary solution for autonomous vehicle (AV) localization in Global Navigation Satellite System (GNSS)-degraded urban environments. A novel synchronized dynamic testbed featuring hardware-level integration with wheel revolution tracking enables precise correlation of RFID marker reads with vehicle angular position. Experimental results demonstrate that multi-antenna configurations achieve consistently high read success rates (up to 99.6% at 0.5 m distance), sub-meter localization accuracy (~55 cm marker spacing), and reliable performance at average urban speeds (36 km/h simulated velocity). Spatial diversity from four strategically positioned antennas overcomes multipath interference and orientation challenges inherent to high-speed RFID reading. Processing latency remains well within the 58 ms time budget critical for autonomous navigation. These findings validate RFID’s potential for smart road infrastructure integration and demonstrate a scalable, cost-effective solution for enhancing AV safety and decision-making capabilities through contextual information transmission. Full article
Show Figures

Figure 1

32 pages, 11443 KB  
Article
Development and Optimization of Antennas for 860–960 MHz RFID Applications and Their Impact on the Human Body
by Claudia Constantinescu, Claudia Pacurar, Sergiu Andreica, Marian Gliga, Laura Grindei, Laszlo Rapolti, Dana Terec and Adina Giurgiuman
Technologies 2026, 14(1), 51; https://doi.org/10.3390/technologies14010051 - 9 Jan 2026
Viewed by 1100
Abstract
Radio Frequency Identification (RFID) systems operating in the 860–960 MHz frequency range are widely used in applications such as supply chain management, retail, access control, healthcare, and transportation. This study presents the design, modeling, and fabrication of two antennas for this frequency range, [...] Read more.
Radio Frequency Identification (RFID) systems operating in the 860–960 MHz frequency range are widely used in applications such as supply chain management, retail, access control, healthcare, and transportation. This study presents the design, modeling, and fabrication of two antennas for this frequency range, followed by a comparative analysis to identify the antenna with superior gain. Key parameters, including corner fillets and chamfering, as well as antenna length, were varied to evaluate their impact on gain and S-parameters for the initial antenna considered the best from the two structures analyzed, aiming to optimize performance while minimizing size and keeping the frequency unchanged. Additionally, the antennas’ interaction with the human body was assessed through numerical modeling by evaluating the electric and magnetic fields and calculating the specific absorption rate for a human leg and hand in order to analyze the impact of these types of antennas on the human body. The dimensions of the initial structure were minimized while the antenna operated in the same frequency range, leading to a small decrease in the gain. It was discovered that when analyzing the values of the parameters of interest regarding the interaction with a human body, the RFID will not exceed them when considering the human hand, but it will harm a human foot when not placed at a specific distance from it. Full article
Show Figures

Figure 1

11 pages, 3460 KB  
Article
Design and Fabrication of a Low-Voltage OPAMP Based on a-IGZO Thin-Film Transistors
by Arturo Torres-Sánchez, Isai S. Hernandez-Luna, Francisco J. Hernández-Cuevas, Cuauhtémoc León-Puertos and Norberto Hernández-Como
Nanomaterials 2026, 16(2), 84; https://doi.org/10.3390/nano16020084 - 8 Jan 2026
Viewed by 516
Abstract
In the last few years, Thin Film Transistors (TFTs) based on materials such as amorphous Indium–Gallium–Zinc Oxide (a-IGZO) have gained interest in large-area and low-cost electronics due to their high carrier mobility, high on/off current ratio, low off-state current, and steep subthreshold slope. [...] Read more.
In the last few years, Thin Film Transistors (TFTs) based on materials such as amorphous Indium–Gallium–Zinc Oxide (a-IGZO) have gained interest in large-area and low-cost electronics due to their high carrier mobility, high on/off current ratio, low off-state current, and steep subthreshold slope. These characteristics make IGZO TFTs suitable for radio-frequency identification (RFID) tags, analog-to-digital converters (ADCs), logic circuits, sensors, and analog components, including operational amplifiers (OPAMPs). This work presents the implementation and characterization of an OPAMP based on n-type a-IGZO TFTs fabricated on glass substrate. Two previously reported design strategies were integrated: a positive feedback network to increase the output impedance and a topology to enhance the transconductance of the driver transistors, both in the differential input stage. A gain of 26 dB, a bandwidth of 2.4 kHz, a gain–bandwidth product (GBWP) of 48 kHz, and a phase margin of 64° were obtained, which confirms the reliability of the design and the fabrication process. Full article
(This article belongs to the Special Issue Wide Bandgap Semiconductor Material, Device and System Integration)
Show Figures

Figure 1

Back to TopTop