Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (12): 29-31    DOI:
Current Issue | Archive | Adv Search |
Research on the Tracing System of Auto Parts in Fujian Based on RFID Technology
Wu Jin
Fujian Chuanzheng Communications College
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  The research on the tracing system of auto parts in Fujian based on RFID technology can effectively provide a solution for the chaos market of auto parts in Fujian Province by tracing the problematic parts and finding the related company. This study uses the RFID tags fixing on each auto parts to make them have a unique identity, and the fake auto parts can not exist in Fujian Province. So it can improve the vehicle more safety, and protect the rights and interests of auto parts’manufacture enterprises, sales enterprises and customers.
Key wordsRFID      traceability      safety      security     
Published: 15 November 2017
:  TP391.44  
  U468  

Cite this article:

Wu Jin. Research on the Tracing System of Auto Parts in Fujian Based on RFID Technology. Computer & Telecommunication, 2016, 1(12): 29-31.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2016/V1/I12/29

[1] DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy[J]. 电脑与电信, 2024, 1(6): 31-34.
[2] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[3] YANG Li-jia CHEN Xin-fang ZHAO Han-qing WANG Shi-wei. Water Quality Safety Modeling Prediction Based on Extra Tree Classifier[J]. 电脑与电信, 2024, 1(6): 57-.
[4] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[5] CAO Peng-fei. Exploration and Practice of Self-made Industrial Control Network Security Teaching Equipment[J]. 电脑与电信, 2024, 1(5): 108-.
[6] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[7] ZHANG Jing-wu SONG Jin-ling, JIA Dong-yan, MENG Hai-tao ZHANG Chen-lu. Construction and Application of Knowledge Graph of River Pollution[J]. 电脑与电信, 2023, 1(5): 12-.
[8] HE Zhen-xiang WANG Li-ying.
The Governance Problems and Countermeasures of Network Space
from the Angle of Investigation and Evidence Collection
[J]. 电脑与电信, 2022, 1(1-2): 36-39.
[9] YE Dong CHEN Chun-tao LI Zong-chen LI Jun-yao. Research on the School-Bureau-Enterprise Collaborative Education Model in the Major of Public Security Audio-visual Technology[J]. 电脑与电信, 2021, 1(8): 30-32.
[10] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[11] HAN Hai. An Integrated Security Monitoring Solution in the Judicial Field Based on 5G Private Network[J]. 电脑与电信, 2021, 1(6): 76-78.
[12] FANG Xin. Research on Security of Rip Routing Protocol Based on Python[J]. 电脑与电信, 2021, 1(5): 1-21.
[13] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[14] SUN Wen-wen LIU Qing-liang WU Ruo-chen WANG Xin-tong DONGYE Sheng-yi CAO Lu WANG Xin-li. [J]. 电脑与电信, 2021, 1(4): 59-61.
[15] ZHENG Rui YANG Peng ZHOU Su-xu LI Cheng.
Research on Safety Risk Monitoring and Early Warning System of Key Enterprises
in Industry and Trade
[J]. 电脑与电信, 2021, 1(12): 69-72.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd