Spelling suggestions: "subject:"RFID (radio frequency identification)"" "subject:"RFID (sadio frequency identification)""
1 |
Integration of tracking into horizontal underground transportation system / by Phillip Kingston SalesSales, Phillip Kingston January 2009 (has links)
The world, especially the business world, has changed from consisting of different countries and markets to one global market. This can be attributed to better transportation, communication and information systems. This new development has changed the rules of the business game. No more do companies compete with local players only but increasingly with foreign based entities. Many experts argue that top companies in the world today are those that have embraced new technologies to improve their entire operations. New information technology allows them to integrate their operations upstream with their suppliers, downstream with their clients as well as in-house to improve their efficiencies. This includes mining companies who have to introduce new information, communication and transportation systems to compete with their global counterparts. This study investigates the operation of South African underground mines operation. This is done with a focus on the integration of tracking technology into the horizontal transportation system. The objective is to improve productivity due to better process control. In order to achieve this objective the entire operational process had to be divided into key elements that had to be investigated. The following key elements were identified and investigated: Information and communication strategy,
Organisation structure, Departmental integration, Organisational processes,
Management information, Information management, Management information system,
Solution selection criteria, Causes of low productivity, Problems with logistics system, Technology implementation methods,
Outsourcing, Reasons for technology failure and Future challenges facing industry. The investigation was done in four phases. The first phase provided a framework for a literature study. The second phase comprised a literature study that would set the foundation for the empirical study. The third phase consisted of the empirical study, research methodology and data gathering. The fourth and final phase consisted of data grouping and analysis, conclusions and recommendations. Among the conclusions drawn, the following stand out: There is a general problem in the industry that can be attributed to logistics. There is also a problem of information quality and information flow among the different departments that lead to poor integration. Another problem that was highlighted is the non-involvement of end-users in technology selection and implementation. In terms of future challenges facing the industry, poor education levels, productivity and commodity prices were identified. In terms of solutions for the future, integrating technology, with the involvement of end users, were mentioned. All these findings were uniform across the different mining houses, which show the similarity of the industry culture. / Thesis (M.B.A.)--North-West University, Vaal Triangle Campus, 2009.
|
2 |
Integration of tracking into horizontal underground transportation system / by Phillip Kingston SalesSales, Phillip Kingston January 2009 (has links)
The world, especially the business world, has changed from consisting of different countries and markets to one global market. This can be attributed to better transportation, communication and information systems. This new development has changed the rules of the business game. No more do companies compete with local players only but increasingly with foreign based entities. Many experts argue that top companies in the world today are those that have embraced new technologies to improve their entire operations. New information technology allows them to integrate their operations upstream with their suppliers, downstream with their clients as well as in-house to improve their efficiencies. This includes mining companies who have to introduce new information, communication and transportation systems to compete with their global counterparts. This study investigates the operation of South African underground mines operation. This is done with a focus on the integration of tracking technology into the horizontal transportation system. The objective is to improve productivity due to better process control. In order to achieve this objective the entire operational process had to be divided into key elements that had to be investigated. The following key elements were identified and investigated: Information and communication strategy,
Organisation structure, Departmental integration, Organisational processes,
Management information, Information management, Management information system,
Solution selection criteria, Causes of low productivity, Problems with logistics system, Technology implementation methods,
Outsourcing, Reasons for technology failure and Future challenges facing industry. The investigation was done in four phases. The first phase provided a framework for a literature study. The second phase comprised a literature study that would set the foundation for the empirical study. The third phase consisted of the empirical study, research methodology and data gathering. The fourth and final phase consisted of data grouping and analysis, conclusions and recommendations. Among the conclusions drawn, the following stand out: There is a general problem in the industry that can be attributed to logistics. There is also a problem of information quality and information flow among the different departments that lead to poor integration. Another problem that was highlighted is the non-involvement of end-users in technology selection and implementation. In terms of future challenges facing the industry, poor education levels, productivity and commodity prices were identified. In terms of solutions for the future, integrating technology, with the involvement of end users, were mentioned. All these findings were uniform across the different mining houses, which show the similarity of the industry culture. / Thesis (M.B.A.)--North-West University, Vaal Triangle Campus, 2009.
|
3 |
Modelagem de processo \"supply chain\" informado usando tecnologia RFID: estudo de caso para a cadeia do agronegócio. / Modeling of informed process supply chain using RFID technology: a case study for agribusiness chain.Candido, Roberto 22 May 2013 (has links)
Este trabalho tem como objetivo apresentar uma Metodologia pra implantar um Modelo de Processo Informado de Supply Chain usando tecnologia RFID (Radio Frequency Identification) aplicado ao Agronegócio. Para criação deste Modelo desenvolveu-se uma Metodologia própria utilizando-se de Ferramentas Computacionais Livres que conduziram a criação de um programa especializado para o Supply Chain da Semente de Milho, que foi o caso escolhido para o estudo. Os procedimentos adotados para criação deste Modelo podem facilmente ser remodelados para outras Cadeias do Agronegócio, tais como a Carne, as Frutas, Grãos Comerciais, gerando assim vantagens competitivas aos produtos até então vistos como puras commodities. As aplicações tradicionais do RFID têm sido limitadas ao posicionamento de produtos em armazéns, deixando abertas muitas possibilidades de estudo, como é o caso do Modelo Informado, permitindo ao consumidor final do produto ter todas as informações necessárias para garantia da qualidade junto ao item. A integração de conhecimentos originados no Supply Chain, Processo Informado, RFID e Agronegócio é feita com base em uma estrutura que distribui a informação entre os equipamentos e bancos de dados associados aos leitores de RFID. Neste trabalho a questão da segurança contra leitura não autorizada não foi incluída. / This paper aims to present a methodology to deploy a Process Model Informed \"Supply Chain\" using RFID (Radio Frequency Identification) applied to Agribusiness and Precision Agriculture. The intent of this proposal is to allow tend users of precision agriculture product to handle all the data need to ensure the quality of a target product. Traditional applications of RFID have been limited to product placement in stores, leaving a wide possibility of innovations in Supply Chain management. This case is strongly observed in agribusiness, a very important issue in Brazilian economy, where commodities are susceptible to failure or block orders. The coalescing of knowledge from Supply Chain, Process Informed, RFID and Agribusiness Study is made by a fair distribution of information among tags and databases, generally connected to RFID readers. Finally, a case study was included related to the supply of corn seeds to a culture inserted in the paradigm of precision agriculture.
|
4 |
Modelagem de processo \"supply chain\" informado usando tecnologia RFID: estudo de caso para a cadeia do agronegócio. / Modeling of informed process supply chain using RFID technology: a case study for agribusiness chain.Roberto Candido 22 May 2013 (has links)
Este trabalho tem como objetivo apresentar uma Metodologia pra implantar um Modelo de Processo Informado de Supply Chain usando tecnologia RFID (Radio Frequency Identification) aplicado ao Agronegócio. Para criação deste Modelo desenvolveu-se uma Metodologia própria utilizando-se de Ferramentas Computacionais Livres que conduziram a criação de um programa especializado para o Supply Chain da Semente de Milho, que foi o caso escolhido para o estudo. Os procedimentos adotados para criação deste Modelo podem facilmente ser remodelados para outras Cadeias do Agronegócio, tais como a Carne, as Frutas, Grãos Comerciais, gerando assim vantagens competitivas aos produtos até então vistos como puras commodities. As aplicações tradicionais do RFID têm sido limitadas ao posicionamento de produtos em armazéns, deixando abertas muitas possibilidades de estudo, como é o caso do Modelo Informado, permitindo ao consumidor final do produto ter todas as informações necessárias para garantia da qualidade junto ao item. A integração de conhecimentos originados no Supply Chain, Processo Informado, RFID e Agronegócio é feita com base em uma estrutura que distribui a informação entre os equipamentos e bancos de dados associados aos leitores de RFID. Neste trabalho a questão da segurança contra leitura não autorizada não foi incluída. / This paper aims to present a methodology to deploy a Process Model Informed \"Supply Chain\" using RFID (Radio Frequency Identification) applied to Agribusiness and Precision Agriculture. The intent of this proposal is to allow tend users of precision agriculture product to handle all the data need to ensure the quality of a target product. Traditional applications of RFID have been limited to product placement in stores, leaving a wide possibility of innovations in Supply Chain management. This case is strongly observed in agribusiness, a very important issue in Brazilian economy, where commodities are susceptible to failure or block orders. The coalescing of knowledge from Supply Chain, Process Informed, RFID and Agribusiness Study is made by a fair distribution of information among tags and databases, generally connected to RFID readers. Finally, a case study was included related to the supply of corn seeds to a culture inserted in the paradigm of precision agriculture.
|
5 |
Investigating the design of Smart Objects in the domain of forgetfulnessFarion, Christine January 2018 (has links)
When we forget things, we feel anxious which can impact our day negatively. Some individuals believe they are forgetful, so emphatically, it disrupts their day. There has been little discussion about perceived forgetfulness in design and HCI, combined with few studied smart objects to aid with memory. However, embedded systems, radio frequency identification (RFID) and HCI research provides inspiration towards creating a solution. Challenges of creating a day-to-day smart object that can enhance a user's lifestyle are explored and recommended design guidelines for creating a smart object in a specific domain are the focus of this thesis. Using an experience-centred approach, 'Message Bag' and 'Tag Along' are two purpose built object-based memory aids that have emerged as a result of investigating the design processes for smart objects. The work examines smart objects in the context of forgetting what items to pack in a bag. A solution presented is a device consisting of an RFID system involving (a) pre-tagging essential items; (b) scanning those tagged items and; (c) viewing a corresponding light illuminate, to communicate to the user. Although the conceptual model is simple, success depends on a combination of technical design, usability and aesthetics. These scanning interactions result in a person feeling more confident as suggested through autoethnography reporting, real-world, third person engagements - single user walkouts, conference demos, professional critiques, and residential weekends with potential users (focus group) studies conducted. My work involved extensive autobiographical research and design-led enquiries. Testing was undertaken with investigative prototypes, followed by field testing high-fidelity prototypes. This involved an in-the-wild comparative study involving six users over several months. Results show that people feel more confident and respondents claim no longer needing to continually check items are packed, thus 'gaining time', and feeling less forgetful. Although the application of RFID is not new to ubiquitous computing, this implementation, styling and system immediacy is novel. This thesis presents the development of ten prototypes as well as design guidelines. The research provides a solid base for further exploration, and includes discovery of the importance of a user's style universe and extreme ease-of-use. I conclude with the presentation of early positive results including; (i) the unique form factor becomes a reminder itself and; (ii) usability coupled with the intuitive nature of the system is shown to be essential. We found that when you are creating a smart object, usability and an intuitive nature is even more important than in a standard system. When dealing within the domain of forgetfulness, this is paramount.
|
6 |
New directions in advanced RFID systems.Ranasinghe, Damith Chinthana January 2007 (has links)
Title page, abstract and table of contents only. The complete thesis in print form is available from the University of Adelaide Library. / A combination of Radio Frequency Identification technology and ubiquitous computing are revolutionising the manner in which we look at simple objects. Radio Frequency Identification (RFID) allows RFID labeled objects to be identified at a distance without physical contact, and ubiquitous computing provides a virtually connected environment for the objects. RFID labels are frequently referred to as the next generation barcodes. RFID Systems provide increased productivity, efficiency, convenience and many advantages over bar codes for numerous applications, especially global supply chain management. RFID labeling has a number of advantages over conventional bar code systems. The optics based bar code systems could be rendered useless by common everyday environments containing dirt, dust, smoke, grease, condensation and by misorientation and misalignment. Furthermore bar codes are subject to fraudulent duplication and counterfeiting with minimal effort. However, there are limitations and constraints inherent to RFID technology: semiconductor thresholds, limits on transmitted power, costs, antenna and coupling inefficiencies. Thus it is important for RFID designers to understand these limitations and constraints in order to optimise system designs and overcome inefficiencies where possible. Therefore the work presented in this dissertation seeks to improve the performance of advanced RFID systems by overcoming a number of these limitations. Prior to a discussion of improving performance, the author's interpretation of a modem RFID system along its evolutionary path as a ubiquitous RFID network and its application to supply chain management is described. Performance improvements are achieved by: the development of electromagnetic theory for RFID system analysis and optimisation; design and development of interrogator antennas; analysis of electrically small and tiny antennas for RFID labels; and development and utilisation of a design methodology for creating high performance label antennas and antennas for tagging metallic objects. Implementations of RFID systems have raised concerns regarding information security and possible violations of end-user privacy. The most profound concerns are raised against low cost RFID technology because of its potential for mass scale deployment, its pervasive nature, and the resource limitations preventing the provision of strong cryptographic solutions. There is a growing need in the RFID community to discover and develop techniques and methods to overcome various hurdles posed by the above-mentioned concerns. Thus, the thesis also considers the vulnerabilities of low cost RFID systems and associated insecurities and privacy concerns resulting from the latter. Prior to addressing such concerns impeding the deployment of low cost RFID technology, a framework within which to provide security services is also detailed. It has become important to both defme and identity a framework based around low cost RFID systems since RFID has become a "catch all" phrase for various other forms of technology. Addressing security and privacy of low cost RFID systems requires novel thinking. The later parts of the thesis outline design considerations for security mechanisms and a number of practicable solutions for providing the features of: mutual authentication; confidentiality; message content security; product authentication; anonymity and untraceability, that are necessary for low cost RFID systems to overcome the weaknesses identified in this dissertation. Implementing these security mechanisms requires the generation of true random tag parameters and true random numbers. Achieving these objectives using a hardware based true random number generator is also described and analysed. A final part of the thesis focuses on active RFID labels and improving their performance. The primary concern with active labels is the life of the onboard battery. Turn-on circuits provide a method of turning "on" and "off" an active label remotely to conserve valuable battery power. Analysis, development and testing of a turn-on circuit concept, based on interrogator field sensing, have provided a means of remotely activating and deactivating active RFID labels and conserving battery power. The final chapter of this thesis provides a detailed analysis, based on coupling relations between electromechanical systems, for evaluating the feasibility of a theft detection sensor, based on a turn-on circuit for an active RFID label, for preventing the theft of high value items. While low cost RFID needs to overcome certain security and privacy related barriers, RFID technology does provide novel and valid approaches to such security related applications as product authentication, anti-counterfeiting and theft detection. It is believed that the contributions from this thesis will extend and elaborate on the existing knowledge base, paving the way forward to allow further significant deployment of advanced RFID techno logy. / http://proxy.library.adelaide.edu.au/login?url= http://library.adelaide.edu.au/cgi-bin/Pwebrecon.cgi?BBID=1368084 / Thesis (Ph.D.) -- University of Adelaide, School of Electrical and Electronic Engineering, 2007
|
7 |
Relationship between Frequency of RFID Tags and Its Ability to Penetrate Fresh ConcreteSridharan, Rajasekaran 2010 May 1900 (has links)
The concrete maturity method can be utilized to determine in situ strength of concrete. It uses the temperature of concrete to determine a maturity index that can then be used to determine strength of concrete. However, monitoring the concrete temperature using thermocouples brings up a wiring issue, which is not advisable in an equipment and human intensive area like a construction site. One of the ways to get around this wiring issue is to use Radio Frequency Identification (RFID) technology, which is capable of transmitting information wirelessly. Previous research implemented using ultra high frequency RFID tags embedded in fresh concrete found that water could be the impediment for transmitting RFID signal from within concrete during early stages of curing. From literature it was found that lower the frequency, better the chances of the wave penetrating water. The objective of the research was to figure out whether the frequency of RFID tags has any relationship with the readability of RFID tags embedded in fresh concrete. For this investigation, low frequency, high frequency, and ultra high frequency RFID tags were tested within fresh concrete to see any difference between tags in terms of transmitting information. This experiment was carried out in a controlled space to reduce the number of variables affecting the experiment outcome. The low frequency, high frequency, and ultra high frequency RFID tags were placed within 2 in x 3 in x 2 in wooden formwork at a depth of 4 in, 8 in, and 12 in. Ready mix concrete was poured into the formwork and 3 concrete cubes were cast with the tags embedded within them. Readers that could be connected to a laptop were used to monitor and collect the time at which these RFID tags can be detected.
The test showed that the RFID signals from the low frequency tags at all depths were detected as soon as concrete was poured. The Ultra High Frequency tags placed at the 4" level could be detected 15 minutes after concrete was poured. The UHF tags at the 8" level could be detected after 30 minutes. The UHF tags at the 12" level took on an average 2 hours to be detected from the vicinity of the formwork. The greater the depth at which the ultra high frequency tag was buried the longer it took for it to be detected. The high frequency tags could be detected only at the 4" level. The reason the performance of the HF card degraded in concrete could be because it uses an aluminum foil antenna which is more susceptible to the environment changing the relative permeability. A copper wire antenna could have fared better in this condition, increasing the chances of detecting the tag. Moreover a passive tag was used. The read range and chances of detection could have been increased had an active tag been used. The power of the reader that was used was also very less which might have contributed to the tag not being detected.
Among the tags that were used in the experiment it was found that low frequency tags was the tag that could be detected the earliest after concrete was poured into the forms. However, the maximum read range of the tag observed in the experiment was 20" which is too small a distance to be used on an actual construction site.
|
8 |
New directions in advanced RFID systems.Ranasinghe, Damith Chinthana January 2007 (has links)
Title page, abstract and table of contents only. The complete thesis in print form is available from the University of Adelaide Library. / A combination of Radio Frequency Identification technology and ubiquitous computing are revolutionising the manner in which we look at simple objects. Radio Frequency Identification (RFID) allows RFID labeled objects to be identified at a distance without physical contact, and ubiquitous computing provides a virtually connected environment for the objects. RFID labels are frequently referred to as the next generation barcodes. RFID Systems provide increased productivity, efficiency, convenience and many advantages over bar codes for numerous applications, especially global supply chain management. RFID labeling has a number of advantages over conventional bar code systems. The optics based bar code systems could be rendered useless by common everyday environments containing dirt, dust, smoke, grease, condensation and by misorientation and misalignment. Furthermore bar codes are subject to fraudulent duplication and counterfeiting with minimal effort. However, there are limitations and constraints inherent to RFID technology: semiconductor thresholds, limits on transmitted power, costs, antenna and coupling inefficiencies. Thus it is important for RFID designers to understand these limitations and constraints in order to optimise system designs and overcome inefficiencies where possible. Therefore the work presented in this dissertation seeks to improve the performance of advanced RFID systems by overcoming a number of these limitations. Prior to a discussion of improving performance, the author's interpretation of a modem RFID system along its evolutionary path as a ubiquitous RFID network and its application to supply chain management is described. Performance improvements are achieved by: the development of electromagnetic theory for RFID system analysis and optimisation; design and development of interrogator antennas; analysis of electrically small and tiny antennas for RFID labels; and development and utilisation of a design methodology for creating high performance label antennas and antennas for tagging metallic objects. Implementations of RFID systems have raised concerns regarding information security and possible violations of end-user privacy. The most profound concerns are raised against low cost RFID technology because of its potential for mass scale deployment, its pervasive nature, and the resource limitations preventing the provision of strong cryptographic solutions. There is a growing need in the RFID community to discover and develop techniques and methods to overcome various hurdles posed by the above-mentioned concerns. Thus, the thesis also considers the vulnerabilities of low cost RFID systems and associated insecurities and privacy concerns resulting from the latter. Prior to addressing such concerns impeding the deployment of low cost RFID technology, a framework within which to provide security services is also detailed. It has become important to both defme and identity a framework based around low cost RFID systems since RFID has become a "catch all" phrase for various other forms of technology. Addressing security and privacy of low cost RFID systems requires novel thinking. The later parts of the thesis outline design considerations for security mechanisms and a number of practicable solutions for providing the features of: mutual authentication; confidentiality; message content security; product authentication; anonymity and untraceability, that are necessary for low cost RFID systems to overcome the weaknesses identified in this dissertation. Implementing these security mechanisms requires the generation of true random tag parameters and true random numbers. Achieving these objectives using a hardware based true random number generator is also described and analysed. A final part of the thesis focuses on active RFID labels and improving their performance. The primary concern with active labels is the life of the onboard battery. Turn-on circuits provide a method of turning "on" and "off" an active label remotely to conserve valuable battery power. Analysis, development and testing of a turn-on circuit concept, based on interrogator field sensing, have provided a means of remotely activating and deactivating active RFID labels and conserving battery power. The final chapter of this thesis provides a detailed analysis, based on coupling relations between electromechanical systems, for evaluating the feasibility of a theft detection sensor, based on a turn-on circuit for an active RFID label, for preventing the theft of high value items. While low cost RFID needs to overcome certain security and privacy related barriers, RFID technology does provide novel and valid approaches to such security related applications as product authentication, anti-counterfeiting and theft detection. It is believed that the contributions from this thesis will extend and elaborate on the existing knowledge base, paving the way forward to allow further significant deployment of advanced RFID techno logy. / http://proxy.library.adelaide.edu.au/login?url= http://library.adelaide.edu.au/cgi-bin/Pwebrecon.cgi?BBID=1368084 / Thesis (Ph.D.) -- University of Adelaide, School of Electrical and Electronic Engineering, 2007
|
9 |
Security and Privacy in Large-Scale RFID SystemsSakai, Kazuya January 2013 (has links)
No description available.
|
10 |
Nurses' Acceptance of RFID Technology in a Mandatory-Use EnvironmentNorten, Adam 01 January 2011 (has links)
Radio frequency identification (RFID) technology allows for the scanning of RFID-tagged objects and individuals without line-of-sight requirements. Healthcare organizations use RFID to ensure the health and safety of patients and medical personnel and to uncover inefficiencies in operations. The successful implementation of a system incorporating RFID technologies requires acceptance and use of the technology. Nurses are a group of employees who must use RFID in hospitals throughout the United States. However, due to their being tracked by RFID technology, some of these nurses feel like "big brother" is watching them.
This predictive study used a theoretical model that assessed the effect of five independent variables, namely, privacy concerns, attitudes, subjective norms, controllability, and self-efficacy, on a dependent variable, nurses' behavioral intention to use RFID. A total of 106 U.S. registered nurses answered a Web-based questionnaire containing previously validated and adapted questions that were answered through a five-point Likert scale. Two statistical methods, linear regression and multiple linear regression, were used to investigate the survey results. The results of the linear regression analysis showed that privacy concerns, attitudes, subjective norms, and self-efficacy were each a significant predictor of nurses' behavioral intention to use RFID. The results of the multiple linear regression analysis showed that all the constructs together accounted for 60% of the variance in nurses' intention to use RFID. Of the five predictors in the model, attitudes provided the largest unique contribution when the other predictors in the model were held constant. Subject norms also provided a unique contribution. The other predictors in the model (privacy concerns, controllability, and self-efficacy) were not statistically significant and did not provide a significant unique contribution to nurses' behavioral intention to use RFID.
The outcomes of this study constitute a significant original contribution to the body of knowledge in the area of information systems by enhancing understanding of the factors affecting RFID acceptance among nurses. The results of this research also provide hospitals and medical centers that require their nurses to use RFID technology with information that they can use to address barriers to their nurses' acceptance and use of RFID technology.
|
Page generated in 0.3157 seconds