Solved

Does any one know of any good resources... websites or books that can describe very well the design of an RFID tagged RTLS system using DTOA

Posted on 2008-10-23
2
252 Views
Last Modified: 2012-05-05
Does any one know of any good resources... websites or books that can describe very well the design of an RFID tagged RTLS system using DTOA
0
Comment
Question by:jtiernan2008
2 Comments
 
LVL 39

Accepted Solution

by:
PUNKY earned 500 total points
ID: 22809623
There might not one resource for all what you want, you might try to get partial, for example in link below:
http://www.filebook.net/t1373-Cambridge-Press-RFID-Technology-and-Applications-Jun-2008-eBook-BBL.html
 
0
 
LVL 1

Author Closing Comment

by:jtiernan2008
ID: 31509266
ya, I have this one already... great minds think alike :D
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Need help identifying correct Network Device and IP Scheme 4 64
How to boost WiFi? 7 44
Cisco Aironet 1832i Mobility Express 3 59
Wifi install - small London office 9 110
In this article I will describe how to setup a Cisco WLC 5508 to work with Apple's Bonjour protocol across VLANs.  I will also discuss using screen mirroring and Airplay on an AppleTV v3.  This article covers the wireless network only and requires m…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now