• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 298
  • 105
  • 94
  • 78
  • 68
  • 55
  • 21
  • 18
  • 18
  • 15
  • 13
  • 9
  • 7
  • 7
  • 5
  • Tagged with
  • 886
  • 164
  • 142
  • 133
  • 127
  • 105
  • 91
  • 79
  • 74
  • 71
  • 70
  • 68
  • 63
  • 62
  • 61
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
301

Modeling the Impact of Automated Materials Locating and Tracking Technology on the Construction Supply Network

Young, Duncan January 2009 (has links)
Ineffective materials and equipment management continues to be a leading cause of poor performance on construction projects today. Many of the problems arise as a result of the inability to convey information pertaining to the location and status of construction material and equipment in an accurate and efficient manner. The integration of automated materials locating and tracking technologies (AMLTT) within the construction supply network presents a viable solution to this problem. The objective of this thesis is to further the understanding of the broader impact which these technologies could have on construction supply network management and the construction management process in general. This knowledge, however limited, is increasingly important as leaders in other industry sectors are beginning to report tangible benefits as a result of the integration of these technologies within their organizations’ supply networks. Using a modeling and simulation approach, the impact of AMLTT on three segments of the construction supply network, typical to most large scale and industrial construction projects, was investigated. The results indicate the potential for AMLTT to have a positive impact on resource allocation, productivity, risk mitigation, and improving the overall performance of the construction supply network in general.
302

Design and Analysis of Security Schemes for Low-cost RFID Systems

Chai, Qi 01 1900 (has links)
With the remarkable progress in microelectronics and low-power semiconductor technologies, Radio Frequency IDentification technology (RFID) has moved from obscurity into mainstream applications, which essentially provides an indispensable foundation to realize ubiquitous computing and machine perception. However, the catching and exclusive characteristics of RFID systems introduce growing security and privacy concerns. To address these issues are particularly challenging for low-cost RFID systems, where tags are extremely constrained in resources, power and cost. The primary reasons are: (1) the security requirements of low-cost RFID systems are even more rigorous due to large operation range and mass deployment; and (2) the passive tags' modest capabilities and the necessity to keep their prices low present a novel problem that goes beyond the well-studied problems of traditional cryptography. This thesis presents our research results on the design and the analysis of security schemes for low-cost RFID systems. Motivated by the recent attention on exploiting physical layer resources in the design of security schemes, we investigate how to solve the eavesdropping, modification and one particular type of relay attacks toward the tag-to-reader communication in passive RFID systems without requiring lightweight ciphers. To this end, we propose a novel physical layer scheme, called Backscatter modulation- and Uncoordinated frequency hopping-assisted Physical Layer Enhancement (BUPLE). The idea behind it is to use the amplitude of the carrier to transmit messages as normal, while to utilize its periodically varied frequency to hide the transmission from the eavesdropper/relayer and to exploit a random sequence modulated to the carrier's phase to defeat malicious modifications. We further improve its eavesdropping resistance through the coding in the physical layer, since BUPLE ensures that the tag-to-eavesdropper channel is strictly noisier than the tag-to-reader channel. Three practical Wiretap Channel Codes (WCCs) for passive tags are then proposed: two of them are constructed from linear error correcting codes, and the other one is constructed from a resilient vector Boolean function. The security and usability of BUPLE in conjunction with WCCs are further confirmed by our proof-of-concept implementation and testing. Eavesdropping the communication between a legitimate reader and a victim tag to obtain raw data is a basic tool for the adversary. However, given the fundamentality of eavesdropping attacks, there are limited prior work investigating its intension and extension for passive RFID systems. To this end, we firstly identified a brand-new attack, working at physical layer, against backscattered RFID communications, called unidirectional active eavesdropping, which defeats the customary impression that eavesdropping is a ``passive" attack. To launch this attack, the adversary transmits an un-modulated carrier (called blank carrier) at a certain frequency while a valid reader and a tag interacts at another frequency channel. Once the tag modulates the amplitude of reader's signal, it causes fluctuations on the blank carrier as well. By carefully examining the amplitude of the backscattered versions of the blank carrier and the reader's carrier, the adversary could intercept the ongoing reader-tag communication with either significantly lower bit error rate or from a significantly greater distance away. Our concept is demonstrated and empirically analyzed towards a popular low-cost RFID system, i.e., EPC Gen2. Although active eavesdropping in general is not trivial to be prohibited, for a particular type of active eavesdropper, namely a greedy proactive eavesdropper, we propose a simple countermeasure without introducing extra cost to current RFID systems. The needs of cryptographic primitives on constraint devices keep increasing with the growing pervasiveness of these devices. One recent design of the lightweight block cipher is Hummingbird-2. We study its cryptographic strength under a novel technique we developed, called Differential Sequence Attack (DSA), and present the first cryptanalytic result on this cipher. In particular, our full attack can be divided into two phases: preparation phase and key recovery phase. During the key recovery phase, we exploit the fact that the differential sequence for the last round of Hummingbird-2 can be retrieved by querying the full cipher, due to which, the search space of the secret key can be significantly reduced. Thus, by attacking the encryption (decryption resp.) of Hummingbird-2, our algorithm recovers 36-bit (another 28-bit resp.) out of 128-bit key with $2^{68}$ ($2^{60}$ resp.) time complexity if particular differential conditions of the internal states and of the keys at one round can be imposed. Additionally, the rest 64-bit of the key can be exhaustively searched and the overall time complexity is dominated by $2^{68}$. During the preparation phase, by investing $2^{81}$ effort in time, the adversary is able to create the differential conditions required in the key recovery phase with at least 0.5 probability. As an additional effort, we examine the cryptanalytic strength of another lightweight candidate known as A2U2, which is the most lightweight cryptographic primitive proposed so far for low-cost tags. Our chosen-plaintext-attack fully breaks this cipher by recovering its secret key with only querying the encryption twice on the victim tag and solving 32 sparse systems of linear equations (where each system has 56 unknowns and around 28 unknowns can be directly obtained without computation) in the worst case, which takes around 0.16 second on a Thinkpad T410 laptop.
303

Characterization and Performance Analysis of UHF RFID Tag for Environmental Sensing Applications

Li, Zhenzhong January 2012 (has links)
Passive radio frequency identification (RFID) tag has been shown efficient in item tracking and management in the supply chain. Attracted to low weight and small size of wireless nodes, some research work was conducted to extend the RFID advantage into environmental sensing applications. The concept is to using tag frequencies as sensing parameters. When variation occurs in the surrounding environment, such as temperature and humidity level, the operation frequencies of tags would be shifted, and such shift can be used to identify the degree of variation in the environment. One challenge of RFID tag is the distortion from other surrounding objects, the existence of obstacles and metals can have greatly impact on the sensing performance in both accuracy and sensing range. This thesis work conducts an investigation of the performance of a passive radio-frequency identification (RFID) based system. The investigation systematically probed the effects of passive RFID tag orientation and obstacles (blocking line-of-sight between a reader and a tag) as well as reading period (the time required for successful detection) on the range of detection. In the absence of obstacles, optimized tag orientation improved the system reliability and range of detection. At a reading distance where tag readability became unstable, increasing the reading period led to a higher reliability. A theoretical model was also established and was in good agreement with measurement results, providing a simple guideline to the further experiments. This work would also advance the knowledge understanding on wireless sensing on metal effect, humidity and temperature.
304

RFID-integrated plastic pallets in the grocery industry : Contribution to supply chain efficiency

Gundersen, Eivind Arne, Eriksen, Nils Olaf January 2012 (has links)
Problem – Companies and supply chains, such as those in the grocery industry, continuously face stricter requirements in the form of customer satisfaction, quality, profit margins, as well as information sharing in order to stay competitive. One specific technology that may be used in dealing with increasing competitive demands is the radio frequency identification (RFID) technology. A wide body of research recognizes the positive impacts from RFID, yet even so, doubts and uncertainty have been present among different supply chain members in industries striving to put the RFID technology to use. Nevertheless, many actors in the Norwegian grocery industry are replacing traditional wood pallets with plastic pallets, and these pallets are integrated with RFID tags. Purpose – The purpose of this thesis is to investigate how plastic pallets with integrated RFID tags can contribute to improve supply chain efficiency in the grocery industry. Also, the managerial perception on the pallets and their accompanying technology will be compared to the existing literature, to identify if the managerial opinion supports the literature, and if not, where the gaps exist. Method – The thesis combines an exploratory and an explanatory qualitative study of the managerial perception of RFID pallets in the Norwegian grocery industry, and investigates whether the perception supports the literature. The empirical material is gathered through telephone interviews with logistics and warehouse managers in the various companies. Conclusions – Physical implications: The managerial perceptions’ support towards the addressed implications of the reviewed literature is mixed. RFID pallets improve automatic operation processes through reduction in downtime and eases physical handling of pallets. Additionally, sorting of pallets becomes less labor demanding. Regarding holding of goods, the managerial perceptions do not seem to view RFID pallets as an important factor for efficiency improvement. Information related/RFID aspects’ implications: The managerial perceptions in these concerns were based on plans and thoughts, since the technology had not been put to use. There is a difference in producers’ and wholesalers’ perception of whether efficiency in receiving of goods can be improved through utilizing RFID pallets. Concerning dispatching of shipments, the managerial perceptions support the literature in that information-related activities can be automated, and thus improve efficiency and reduce risk of human errors. In regards to information sharing, the managerial perception supports the literature, but highlights that the information’s nature determines whether sharing is considered. Further research could include the retail store level to get a more complete supply chain picture, and also apply the research methods to a larger area in order to investigate the transferability to other industries and countries.
305

A study on the service industry application services innovation in YH Beach Resort

Lin, Cong-Hua 25 August 2010 (has links)
In the service economy, service has dominated economic development. Service industries in the face of the incessant and changing competition, companies not only continuing to create advantages of marketing strategy, but also still need to "service innovation" to create sustainable service advantage. This study aimed to explore the service using innovative services impact study for the Ministry of Economic Affairs premises to promote "innovative service technology projects" The YH-based resorts use the RFID technology creating customer value. From the science service point of view (Service science, management and engineering, SSME), use the latest technology improve service efficiency and customer satisfaction that create greater profits leap. The theoretical development framework Hertog (2000) proposed the "Service Innovation Model" as the main core of this study architecture theory. The results can be observed from the case analysis, YH resort in response to the use of innovative technology, hardware and software for the organizations have done thoroughly improved, but the analysis also pointed that the extent of staff training and attention is relatively scarce, companies only technological innovation is insufficient, and to a management innovation can be technological innovation to achieve the desired efficiency. On the other hand the Empirical results that service innovation and customer satisfaction is positively related to significant, and this can provide that service innovation affect customer satisfaction.
306

Apply Innovation Diffusion Theory for Introducing RFID Systems ¡V A Case of an Ironworks Firm

chang, ming-chih 07 October 2008 (has links)
In recently years, RFID system has been developed rapidly and it is one of the ten most important technologies in this century. Our government (Taiwan) and the manufacture industries both are actively and positively promoting RFID system to enhance immediate reactions of corporate distribution & logistic system, and further improving the corporate operation efficiency and corporate competitive competences. In this study, we use Everett M. Rogers¡¦s (1962) Diffusion of Innovation (DOI) Theory as our framework, with individualized case study such as torpedo car system of steel plant discussing RFID system¡¦s five stages of its implementation process. The five stages are knowledge, persuasion, decision-making, implementation and confirmation. These are the consideration items and evaluation standards when implement RFID system. We research RFID system on its impact in organizational structure and culture, and further compare the impact of adoptive RFID system enterprises and existing resources. We summarized our research findings as following : 1. Large-scale and solid financial enterprises usually take the initiative to collect information and understanding the innovative technologies such as the RFID system. If the technology can be widely applied in the company and bring greater benefits, the employees within the company will propose recommended plans. Therefore, usually early adopters of such technology are big firm companies. 2. Enterprises whom are considering implementing this innovative technology like RFID system, the first focus is its future benefit, followed by the costs and the other factors; if the assessments revealed that can significantly enhance corporate performance, even in the absence of precedent for reference, the enterprises will still try to implement and use this technology. 3. Because the use of innovative technology companies usually lack of precedent and experience for reference, therefore before they adopted, they will survey related examples and will compare the current operation status to improve the efficiency of the forecast evaluation. In the initial stage of introduce innovative technology for a company, increasing corporate performance brought by technology usually remains in forecast period and hard to specify prediction.
307

Developing Ubiquitous Learning System with Robot for Children's Learning

Hung, I-chun 10 July 2009 (has links)
An advanced architecture of learning system with flexible, mobile and joyful features for supporting ubiquitous learning is developed in this research. The architecture consists of five hardware key elements and a supporting information system to form a brand-new ubiquitous learning system. We call the designed and developed system as Ubiquitous Open-structured Neo-tech Edutainment (or u-ONE System for short) which includes learning robot, sensing input device, mobile computing device, mobile output device, wireless local network and u-ONE Software. The design and development of u-ONE System is guided by experiential learning theory, constructivism learning theory, and joyful learning element. Instruction, collaboration learning and self-learning of application modes are supported by u-ONE Software for realizing ubiquitous learning. The aim of this research is to design and develop a prototype of u-ONE System includes hardware and software components for supporting children¡¦s learning by using robot and RFID. Instructor and learners can meet at any place with their own gears to form a u-ONE System and start instruction and/or learning activities. Only instructors need to operate the control station for coordination; learners just intuitively interact with learning robot by a natural and person-to-person-liked interaction method. In u-ONE System, learners do not need to have good information technologies literacy such as the keyboarding skills which are especially crucial for the earlier childhood learners. Besides, many parents and educators are concerned of watching computer screen for a long time that may harm children¡¦s eyesight; u-ONE System provides an alternative solution for this. This research¡¦s experiment result found most learners could arouse their learning motivations and help them concentrate on learning activities. The class order is also improved for instructors more easily to control the behaviors of learners during the class.
308

Design and prototype development of motion and shock sensing rf tags.

Akbar, Muhammad Bashir 06 April 2012 (has links)
Since the inception of the backscatter-radio technology, this field has continually evolved. As a result, this technology is used for a multitude of applications like personnel identification, logistics and assets management and military purposes etc. Radio Frequency Identification (RFID) technology works in several ISM-frequency bands. This work pertains to the design and development of an RF tag that uses 5.8 GHz ISM band for backscatter. This frequency band has many inherent advantages like higher gain antennas, smaller sized tags, increased immunity to conductive object losses, and larger RF bandwidth. The objective of this research is design and prototype development of an RF tag capable of sensing acceleration, angular motion, and shock experienced by an object on which it is installed. The sensed information is modulated onto an incident continuous wave (CW) and backscattered to the reader. Literature research suggested that such work has not been done previously using an RFID platform. The challenges include integration of the sensor, antenna and other electronics to efficiently backscatter the information to the receiver, designing a suitable planar antenna, realtime backscattering of the sensed information, and low power consumption. As a further step, it is required to design and integrate two antennas on RF tag to simultaneously backscatter the same information; and to measure and compare its effect with single antenna tag. The sensed impact/shock and rotational movement information from the inertial sensors (accelerometer and gyroscope) was backscattered instantly and displayed on the custom developed graphical user interface. The development of GUI was not part of this project and was developed by another lab member. RF Tags with single and dual antenna configurations were designed and tested. It was observed that by increasing the number of antennas higher read range can be achieved. Moreover, by doubling the antennas the radar cross-section for the tag was approximately doubled.
309

Passive wireless sensor based on reflected electro-material signatures

Hasan, Azhar 06 April 2012 (has links)
The objective of the proposed research is to devise a methodology for sensing and tracking environmental variables using a passive wireless sensor based on reflected electro-material signatures. Viability of item level tracking demands the sensor to be extraordinary low cost, thus eliminating the use of any active sensor or memory circuitry. Recent developments of materials whose electrical properties can change significantly with the environmental conditions suggest the possibility of developing a passive sensor that can be interrogated remotely to extract data about the time tracked environmental changes at the sensor. A simple passive sensor, based on the concept of reflected electro-material signatures (REMS), consists of an antenna attached to a microstrip transmission line, which in turn is routed over one or more sections of variable permittivity material before being terminated in a load. The basic idea revolves around sensing the electrical properties of thermotropic liquid crystal (LCs) trapped in a polymer substrate to record the temperature data. As the temperature changes with time, the polymerization process through the material line records the historical temperature profile in the spatial distribution of the electrical properties, thus enabling the system to extract the historical profile of temperature without using any active memory circuitry. This concept can possibly be used to track a variety of variables of interest; however, the proposed research is focused on sensing and extracting the time profile of temperature. The problem of identifying medium properties from waves reflected from a device of this type is a form of the classical one dimensional inverse scattering problem. For profile inversion in a lossy inhomogeneous media, analytical techniques are difficult to implement in most practical situations. In the proposed research, neural networks with a back-propagation algorithm are used to reconstruct the historical temperature profile of the material by extracting the spatially distributed material properties of the electro-material line. After the initial proof of concept for a lossless medium, the methodology is extended to extract spatially distributed properties for a dissipative medium. Finally, for the implementation of REMS sensor concept, a neural network based methodology is developed to reconstruct the spatially distributed permittivity profile of a lossy electro-material line.
310

SafeTool : Implementering av RFID-teknologi i maskiner för byggbranschen

Svensson, Håkan, Carlsson, Carl January 2007 (has links)
<p>Every year more than 6000 thefts, to a value of 1.5 billion SEK, are reported</p><p>within the Swedish building trade. Plus all the indirect costs of having the</p><p>construction site standing still.</p><p>SafeTool is a newly started company that will try to prevent this problem with</p><p>a modern technology solution.</p><p>The key to SafeTool’s solution is RFID – Radio Frequency Identification – and</p><p>the solution looks like this;</p><p>All tools are stored in a container on the construction site. Every tool is</p><p>equipped with a RFID-tag that uniquely identifies the tool. With antennas in the</p><p>container it is possible to detect when a tool is leaving the container and when</p><p>it comes back. Every worker must wear a RFID-tag so it will be possible to see</p><p>who was taking the tool out of the container. The container has no external</p><p>locks on it, but the RFID-tag works as a key. An antenna on the roof of the</p><p>container identifies the worker and automatically unlocks the door.</p><p>All the tool and personnel traffic through the door of the container are reported</p><p>to a central server via GPRS. The server stores all info in a database. The</p><p>administration of the system will be done through a website.</p><p>This paper will show how we made this solution work in practice. How we</p><p>created and programmed the client and server and the protocol that makes them</p><p>understand each other.</p>

Page generated in 0.0338 seconds