Spelling suggestions: "subject:"poor lack"" "subject:"poor look""
1 |
Strtegic Alliance Case Study ¡V Door Lock IndustryCHU, JUNG-HO 17 August 2006 (has links)
Abstract
For recent years, enterprises in Taiwan face the challenges of global competition. Most of Taiwan companies cannot compete with international companies on capital or scale. Thus cooperation with competitors or formation of strategic alliance become one of the best policy of reducing management and sales cost of entering new market and business risks. For the small-and-medium size enterprises which own unique skills but are lack of resources and new technologies, it could be the niche of entering global market to obtain transfer of technologies and management skill from superior internationalized enterprises.
Door lock manufacturing industry is an absolute conservative industry. From the ancient year, due to security concern, it was a family inherited business. Through technology breakthrough and industrial revolution, it gradually turns into a mass production industry. Like most of the other industry, in recent years, Taiwan was developed to be an important manufacturing base of the global door lock industry.
This thesis adopted the exploring methodology. It conducted its study based on the industrial analysis. It analyzes the door lock industry through horizontal analysis ¡V competitor analysis and vertical analysis ¡V supply chain analysis. It further create the following assumptions based on the resources interdependence theory, transaction cost theory and Porter¡¦s five forces analysis:
1. The motivation of strategic alliance is based on the resources interdependence theory.
2. The selection of partner in the strategic alliance is based on the transaction cost theory.
3. The objectives of strategic alliance are based on Porter¡¦s five forces analysis.
Based on the above assumptions, this study conducted analysis on the strategic alliance project in between Taiwan Fu Hsing Industrial Co. Ltd. and Ingersoll Rand Group of companies. Through in-depth interviews with management executives from both companies, this study build up a model confirming the above assumptions. Further more, this thesis also present a series of recommendations to both companies in hope of leading this strategic alliance project into a win-win situation.
Key words: Strategic alliance, Door lock industry
|
2 |
Home Automation System : A cheap and open-source alternative to control household appliances / Automation i hemmet : en ekonomisk lösning med öppen källkodRuwaida,, Bassam, Minkkinen, Toni January 2013 (has links)
This project revolves around creating a home automation system prototype with the main focus being the ability to lock/unlock a door through the internet. The system consists of a central device, a server and an Android application.The central device is a microprocessor, in this case, a Raspberry Pi that connects to the Internet and receives an order to control a motor which in turn turns the lock with the help of gears. The ability to rotate the motor in both directions is achieved by the use of an H-bridge. The server manages users and devices, and handles the communication between the application and the central device. Users and devices are stored in a database on the server. The application is a frontend which presents the user with a list of devices to interact with.The main prototype where the Raspberry Pi acted as a central device was abandoned due to time and resource constraints. It was instead used to control the motor directly. This brought up some problems concerning powering the device using batteries. The software of the prototype is mostly working but due to the same time limitations not all planned features could be implemented.
|
3 |
Výroba součásti dveřního zamykání sdruženým nástrojem / Manufacturing of part of door lock by compound toolNečas, Petr January 2014 (has links)
Academic thesis, drawn up within the framework of engineering studies, presents a proposal optimal production of garage door lock striker. The part is manufactured from steel sheet S275JR of 1.5 mm thickness. By the analysis of its possible methods of production, with regard to the required annual series of 500,000 pieces, was chosen technology of manufacturing the part in the compound tool by blanking and bending processes. For these technologies was designed solution of the compound tool and automatic production line with the eccentric crank press SMERAL S160, where is the compound tool fixed. The measure of financial performance of manufacturing the part is economical assessing. In the current state is investment return in the production of 179,186 pieces of the parts.
|
4 |
Evaluating the security of a smart door lock systemVeijalainen, Sebastian, Noreng Karlsson, Tommy January 2021 (has links)
Smart home appliances and IoT devices in general are a fast growing market. Smart door locks are one type of device which is included in these categories. The smart door lock replaces a common deadbolt lock. In this study a smart door lock was penetration tested. The project started with a literature study, followed by a reconnaissance phase for gathering information about the smart door lock system. A threat model was created based on the findings during the reconnaissance phase and with the help of the STRIDE and DREAD frameworks. Penetration tests were chosen and conducted based on the threat model. The results of the penetration tests showed no major vulnerabilities, but a weakness in the communications between the mobile app and the server. / Smarta apparater och generellt enheter på sakernas internet är en snabbt växande marknad. Smarta dörrlås är en slags enhet som inkluderas i dessa kategorier. I den här studien penetrationstestades ett smart dörrlås. Projektet började med en litteraturstudie, följt av en spaningsfas för att samla in information om det smarta låssystemet. En hotmodell skapades baserad på fynden från spaningsfasen och med hjälp av ramverken STRIDE och DREAD. Penetrationstester valdes och genomfördes baserat på hotmodellen. Resultaten från penetrationstesterna visade inga större sårbarheter, men en svaghet i kommunikationen mellan mobilappen och värddatorn.
|
5 |
Bezklíčový přístup do vozidla pomocí technologie Bluetooth Low Energy / Bluetooth® Low Energy Vehicle Keyless EntryŠterc, Filip January 2020 (has links)
Tato práce se zabývá návrhem demonstračního kitu bezlíčového přístupu pro vozidla s využitím nejnovějších integrovaných obvodů Bluetooth Low Energy a budičů automobilové sběrnice od společnosti ON Semiconductor. Aplikace umožňuje ruční i automatické odemykání dveří vozidla ze vzdáleného klíče realizovaného chytrým telefonem. Řešení se zabývá detekcí vzdálenosti vzdáleného klíče, bezpečností BLE spojení a komunikací přes automobilovou sběrnici LIN mezi moduly demonstračního kitu.
|
6 |
Knock-Knock Door Lock : Unlocking your door with a secret knock sequence / Knack-Knack Öppna TackANDERSSON, FILIP, BERGLING, DAVID January 2020 (has links)
The door lock - a key function in every modern home, as well as a product which is today undergoing drastic change. The digital revolution has not left the door lock untouched, and there is today a wide variety of digital door locks utilizing technologies ranging from touch displays to fingerprint readers. The premises of the project was to try a different approach to the digital door lock and implement it schoolyard-style using a secret knock sequence, set by the user. The secret sequence would consist of two elements, both a rhythmical and a positional pattern. To unlock the door, the user would therefore need to simultaneously knock the correct rhythm and knock at the correct positions. To record and analyze the knock vibrations, piezo electric sensors connected to an Arduino Uno were used. To unlock the door, a small servo motor, two gears and a timing belt were used to turn the lock turning knob . Despite a short time frame and hardships due to the limitations caused by the coronavirus outbreak, a fully functional prototype which fulfilled both reliability and consistency was achieved. It could with good consistency recognize the test sequence, which was the intro rhythm to ”We Will Rock You” knocked in a square pattern. But even with flawless functionality, the conclusion would have been the same. The security of the system may be exceptional from a technical perspective, but it falls flat when the human factor is taken into account. The ability for a potential burglar to simply watch as one executes the secret knock is too much of a security hazard for the system to ever be considered as a competitor to other alternatives. The usage of the system is therefore better suited for applications where the thrill of using the product is more important than the actual security of it. / Dörrlåset - en grundläggande funktion i varje modernt hem, och samtidigt en produkt som idag genomgår drastisk förändring. Som resultat av den digitala revolutionen finns det idag en uppsjö av olika digitala dörrlås som utnyttjar allt från touchskärmar till fingeravtrycksläsare. Syftet med projektet var att testa en annorlunda tappning på det digitala dörrlåset, och förverkliga något många hade drömt om i barndomen - ett dörrlås aktiverat genom ett eget hemligt knackningsmönster. Det hemliga knackningsmönstret skulle då bestå av både ett rytmiskt och ett positionellt mönster. Därmed skulle den som ville öppna dörren behöva knacka både rätt rytm, och på rätt ställen på dörren. För att spela in och analysera vibrationerna från knackningarna användes piezoelektriska sensorer kopplade till en Arduino Uno. Mekanismen som styrde själva upplåsningen bestod av en liten servomotor, två kugghjul och en kuggrem som kopplade samman det hela. Trots en begränsad tidsram och motgångar orsakade av coronaviruset lyckades en fullt fungerande prototyp med hög pålitlighet färdigställas. Den kunde med hög tillförlitlighet känns igen testsekvensen, som var introrytmen till ”We Will Rock You” knackat i mönstret av en kvadrat. Men även med felfri prestanda hade slutsatsen varit densamma. Säkerheten för systemet må vara exeptionell ur ett rent tekniskt perspektiv, men den faller platt när den mänskliga faktorn tas med i beräkningen. Risken att en potentiell inbrottstjuv helt enkelt tittar på när någon knackar det hemliga mönstret är för stor för att systemet någonsin skulle kunna betraktas som en seriös konkurrent till andra digitala dörrlås. Produkten är därmed bäst lämpad för användningsområden där nöjet av att använda den är av högre prioritet än själva säkerheten.
|
7 |
Penetration testing of Sesame Smart door lock / Penetrationstest av Sesame Smart dörrlåsLiu, Shuyuan January 2023 (has links)
The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. This thesis work aims to evaluate and investigate the security aspect of the newest smart door lock. This thesis first provides an introduction and background of penetration testing and creates the threat model. Based on the threat model, some testings are conducted, including state consistency, Man-In-The-Middle (MITM) attack, replay attack, reverse engineering, GPS spoofing, Denial of service (DoS) attack. The result indicates that penetration tests reveal some security problems on the tested device, especially in the access log, traffic between application and server, and the ability of resistance disruption on the WiFi access point. / IoT-enheten har använts i stor utsträckning inom olika områden och dess marknad expanderar snabbt. Den ökande användningen av IoT-enheter medför dock också fler säkerhetsproblem. Det smarta dörrlåset är en av de smarta hem IoT-enheterna som måste utformas säkert. Detta examensarbete syftar till att utvärdera och undersöka säkerhetsaspekten av det nyaste smarta dörrlåset. Denna avhandling ger först en introduktion och bakgrund av penetrationstestning och skapar hotmodellen. Baserat på hotmodellen genomförs vissa tester, inklusive tillståndskonsistens, MITM attack, replay attack, reverse engineering, GPS spoofing, DoS attack. Resultatet indikerar att penetrationstester avslöjar vissa sårbarheter på den testade enheten, särskilt i åtkomstloggen, trafik mellan applikation och server och förmågan till motståndsavbrott på WiFi-åtkomstpunkten.
|
Page generated in 0.0648 seconds