• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 99
  • 25
  • 9
  • 9
  • 6
  • 5
  • 4
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 200
  • 200
  • 200
  • 111
  • 96
  • 27
  • 25
  • 23
  • 22
  • 22
  • 19
  • 19
  • 19
  • 18
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Selektivt larmsystem

Cronholm, Simon, Zelejakovic, Faruk, Olofsson, Mikael January 2003 (has links)
No description available.
2

Selektivt larmsystem

Cronholm, Simon, Zelejakovic, Faruk, Olofsson, Mikael January 2003 (has links)
No description available.
3

Measuring and predicting the performance of RFID-tagged objects

Mallinson, Hugo Francis January 2010 (has links)
No description available.
4

A passive RFID real time sensing system for intelligent infrastructure

Sabesan, Sithamparanathan January 2011 (has links)
No description available.
5

An Analysis of the Radio Frequency Identification (RFID) Technology Implementation within an Independent Public Library System: A Case Study of the North Canton, Ohio Public Library

Lyons, Keith P. 01 January 2010 (has links)
An Analysis of the Radio Frequency Identification (RFID) Technology Implementation within an Independent Public Library System: A Case Study of the North Canton, Ohio Public Library by Keith P. Lyons June 2010 Public libraries require efficient control systems to maintain accurate inventories, statistics, and records of patron borrowing. Generally, public libraries use barcode technology to accomplish these tasks. Radio frequency identification (RFID) has gained the attention of public library personnel in recent years as a replacement for barcodes. RFID implementation contributes to improved staff productivity, increased operational efficiency, and improved item security as well. While potential benefits are significant, issues to consider prior to adoption include system costs, as well as privacy and security concerns. As a consequence of increased patron use and limited budgets, the role of RFID in the public library is promoted as a solution to many of today's challenges. RFID in the public library can assist by improving inventory tracking, improving customer service, and decreasing theft. Using the case study methodology in conjunction with the System Development Life Cycle (SDLC), the author examined RFID use at the North Canton Public Library and its capabilities in improving inventory tracking, providing item security, and supporting customer service. Qualitative data were collected using focused interviews, documentation, direct observation, and participant observation. Findings from this investigation revealed a significant decrease in time required to perform inventory tasks and an increase in time available for library staff to assist patrons. Additionally, evidence demonstrated an increase in the efficiency of patron records due to the automation of the checkout process. Patron privacy and data security were maintained by adherence to RFID implementation guidelines established by the American Library Association (ALA). The findings from this investigation provide public library administrators considering adoption of RFID with a thorough understanding of pre-implementation considerations and the benefits, drawbacks, logistical concerns, and privacy issues that must be addressed for successful results.
6

Implementation of a VANET Geo-Fence Based Adaptive Traffic Light Control Scheme

Unknown Date (has links)
In this thesis we extend the VANET-based approach to counting vehicles at a traffic light by implementing a Geo-fence Based Vehicle Counting Algorithm which supports the use of RFID technology. This implementation utilizes the concept of geo-fencing to create a Zone of Interest (ZOI) that sections off a roadway that is relevant to a traffic intersection. All vehicles in this ZOI are used to determine the required length of the green-cycle time. By utilizing vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) technologies, we broadcast beacons that are propagated to all vehicles in the ZOI from the infrastructure which in this case is the traffic light controller. These beacons are used to determine the last vehicle location in the ZOI. A timing algorithm ensures that the last vehicle broadcasts first. The beacons are sent using the IEEE 1609.4 Wireless Access in Vehicular Environments Standard Vendor Specific Action (VSA) frames on the Smart Drive Initiative Vehiclular Ad Hoc Networks testbed. This work is implemented in conjunction with the Vehicular Multi-technology Communication Device (VMCD) supported by the National Science Foundation. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2016. / FAU Electronic Theses and Dissertations Collection
7

RFIDs användning i produktionsprocesser : en studie bland operatörer på Lear Corporation

Andersson, Jessica, Larsson, Stina, Jendesand, Gunilla January 2005 (has links)
No description available.
8

Next Generation RFID Randomization Protocol

LaValley, Jason 06 December 2011 (has links)
Radio Frequency IDentification (RFID) is a wireless communications technology which allows companies to secure their assets and increase the portability of information. This research was motivated by the increased commercial use of RFID technology. Existing security protocols with high levels of security have high computation requirements, and less intensive protocols can allow a tag to be tracked. The techniques proposed in this thesis result in the increase of ciphertexts available without a significant increase in processing power or storage requirements. The addition of random inputs to the generation of ciphertexts will increase the number of possible results without requiring a more advanced encryption algorithm or an increased number of stored encryption keys. Four methods of altering the plaintext/ciphertext pair (random block, set pattern, random pattern, and indexed placement) are analyzed to determine the effectiveness of each method. The number of ciphertexts generated, generation time, and generation errors were recorded to determine which of the four proposed methods would be the most beneficial in a RFID system. The comparison of these method characteristics determined that the set pattern placement method provided the best solution. The thesis also discusses how RFID transmissions appear to attackers and explains how the random inputs reduce effectiveness of current system attacks. In addition to improving the anonymity of RFID tag transmissions, the concept of authenticating random inputs is also introduced in this thesis. These methods help prevent an adversary from easily associating a tag with its transmissions, thus increasing the security of the RFID system.
9

Next Generation RFID Randomization Protocol

LaValley, Jason 06 December 2011 (has links)
Radio Frequency IDentification (RFID) is a wireless communications technology which allows companies to secure their assets and increase the portability of information. This research was motivated by the increased commercial use of RFID technology. Existing security protocols with high levels of security have high computation requirements, and less intensive protocols can allow a tag to be tracked. The techniques proposed in this thesis result in the increase of ciphertexts available without a significant increase in processing power or storage requirements. The addition of random inputs to the generation of ciphertexts will increase the number of possible results without requiring a more advanced encryption algorithm or an increased number of stored encryption keys. Four methods of altering the plaintext/ciphertext pair (random block, set pattern, random pattern, and indexed placement) are analyzed to determine the effectiveness of each method. The number of ciphertexts generated, generation time, and generation errors were recorded to determine which of the four proposed methods would be the most beneficial in a RFID system. The comparison of these method characteristics determined that the set pattern placement method provided the best solution. The thesis also discusses how RFID transmissions appear to attackers and explains how the random inputs reduce effectiveness of current system attacks. In addition to improving the anonymity of RFID tag transmissions, the concept of authenticating random inputs is also introduced in this thesis. These methods help prevent an adversary from easily associating a tag with its transmissions, thus increasing the security of the RFID system.
10

RFIDs användning i produktionsprocesser : en studie bland operatörer på Lear Corporation

Andersson, Jessica, Larsson, Stina, Jendesand, Gunilla January 2005 (has links)
No description available.

Page generated in 0.0371 seconds