• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 298
  • 105
  • 94
  • 78
  • 68
  • 55
  • 21
  • 18
  • 18
  • 15
  • 13
  • 9
  • 7
  • 7
  • 5
  • Tagged with
  • 886
  • 164
  • 142
  • 133
  • 127
  • 105
  • 91
  • 79
  • 74
  • 71
  • 70
  • 68
  • 63
  • 62
  • 61
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Förenklad felinformation på trafikinformationsutrustning

Granbom, Markus January 2013 (has links)
This thesis lays the foundation of the future routines of effective error repotring fortraffic devices in the raiway sector.If a device, for example a timetable display, stops working it is vital that the device isfixed as fast as possible so that the travelers dont miss any important information.The methods that are used today are old and not very effective. It can take time forthe repairmen to find the right device or locating the broken component. At the sametime he is supposed to maintain telephone contact with central control throughoutthe whole session.The need for a new, more effective, system is vital to make the whole repair pfocessmore effective and let the repairmen work without having to contact the centralcontrol by phone.I started this work by examining the possibilities of assigning every object with aunique identifier (ID tag) that could be accessed by a manual scan device. The ideawas that the ID tag could holw information about the object and be obtained byscanning the ID and get the information presented on a mobile device.The work also included building a internet application that enabled the reader to seeand change the information on the ID tag.The result was a database that stored information of different objects which could beobtained by scanning the ID tag and presented by a internet application.
32

Implementation of RSA Cryptosystem for Next Generation RFID Tags

Dighe, Ashish Arun 29 March 2011 (has links)
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology. By estimating the area, power and time constraints of the RFID platform, it was determined that the area constraint was the critical variable in determining the maximum implementable security variable. Although the application of this algorithm has been targeted for passive HF RFID platforms, the algorithm could be used in other low power, sized constrained applications.
33

Implementation of RSA Cryptosystem for Next Generation RFID Tags

Dighe, Ashish Arun 29 March 2011 (has links)
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology. By estimating the area, power and time constraints of the RFID platform, it was determined that the area constraint was the critical variable in determining the maximum implementable security variable. Although the application of this algorithm has been targeted for passive HF RFID platforms, the algorithm could be used in other low power, sized constrained applications.
34

Design and performance analysis of purely textile antenna for                                                   wireless applications

Dahal, Robi, Mercan, Demet January 2012 (has links)
This thesis work is concerned with the design and performance analysis of purely textile antenna for wireless applications. The materials used for radiating element, ground plane and dielectric substrate are purely textile. Two types of antennas are studied, the microstrip patch antenna and RFID tag antenna. Each type of antenna is designed and fabricated using two different conductive textile materials as radiating element.  The radiating element and ground plane of conventional printed antenna is manufactured with the metal plating on a solid dielectric substrate. The radiating element which is used in this thesis work has different characteristics as compared to printed antenna because it is made of conductive textile material which is less conductive than metal and elastic in nature. Each conductive textile material has different surface resistivity. The study has been made to analyze the effect on gain and radiation efficiency of the antenna when different conductive textile material is used as the radiating element. The measured results of the fabricated antennas present the full potential of conductive textile materials to be used as an antenna.
35

Implementation Study of IEEE 802 : 15.4

Hussain, Assad, Kazim Hafeez, Muhammad January 2006 (has links)
This thesis is analysis-based survey in which our task was to find out the suitability of IEEE 802.15.4 for the RFID systems in terms of power. We studied the different RFID systems. We analyzed the IEEE 802.15.4 to see how much this protocol can facilitate the RFID application, but we just considered the 2.4 GHz physical band as Free2move uses this band for its RFID products. Since semi-passive1 RFIDs are the closest competitors of the active RFID, so we also compared the IEEE 802.15.4 with ISO 18000-4 (mode2) to find out their pros and cons. We also tried to evaluate the hardware architecture proposed by Free2move. We compared proposed hardware components with other competitors available in the market. The main point of focus during hardware evaluation remained its power efficiency. As concluding part we have proposed an idea for using the IEEE 802.15.4 standard in semi- passive RFIDs.
36

Reliability test of a RIFD system for tool management on construction sites

Kalla, Naresh 15 May 2009 (has links)
In the construction industry, one of the aspects that affect the productivity of the construction crew is the availability of tools and supplies. Unavailability of tools and supplies results in a delay of the project, which in turn increases the cost of the project. If any such delays on job sites could be reduced, it would help the construction industry in reduction of time and cost losses. The construction industry is in need of a technology that would improve the presentday tool management system (TMS) to reduce the construction costs from delays in projects. Radio Frequency Identification (RFID) technology offers the possibility that tools and supplies, tagged with RFID devices, could be tracked down automatically. Although the potential of RFID is real, it does have limitations like any other technology. Without understanding and working with the limitations of RFID, this technology may disappoint many before its true and significant capabilities are realized. Before the technology is executed fullfledged, it needs to be tested for reliability on construction sites in particular. Researchers, from many parts of the world, have performed tests to understand the reliability of the RFID technology considering variables like metal interferences, reading range, multiple tag identification, etc. But these tests conducted could not discuss all the factors that may affect the reliability of the technology. This paper identifies other factors that might affect the reliability of RFID technology and tests are conducted to understand the influence of these factors on the readability of the RFID tags. Number of tools and the velocity with which tools are taken across the portal are two variables that are tested for reliability of RFID. Tests are conducted using the experiment setup that resembles a construction site tool management room entrance/exit. Results show a radical decrease in the readability of tags, while the numbers of the tools are increased gradually. And also, when the tools were taken across the RFID portal with gradual increasing velocity, the readability reduced. These results prove that both the tested parameters have an effect on the reliability of RFID technology for tool tracking.
37

A power efficient active RFID communication Protocol

Dávila García, Francisco Javier January 2007 (has links)
<p>Active Radio Frequency Identification (Active RFID) is a wireless automated technology used to identify, track, process and share information about an object or from the environment. As microcontrollers and radio frequency transponders are smaller in size, more power efficient, and less expensive, this technology is growing and starting to expand significantly through all the industries. The main purpose of with this project was to reduce the ower consumption of the active tags. This master thesis presents a functional TDMA based protocol which was designed and developed for a specific tracking system application.</p>
38

RFID : a catalyst for supply chain performance

Lakshmanan, Alagendran January 2009 (has links)
<p>THE ADVANTAGE OF RFID TECHNOLOGY IMPLEMENTATION IN A MANUFACTURING FIRM. THE TECHNOLOGY IMPLEMENTATION STREAM LINES THE LOSS OF INFORMATION FLOW WHEN THE PRODUCT MOVES ALONG THE DIFFERENT CHAIN MEMBERS. THE COMMON SHARING OF THE ASSOCIATED BENEFIT BRINGS HIGHER PROCESS EFFICEINCY , WHEN THE PRODUCT MOVES ALONG THE UPSTREAM AND DOWNSTREAM SUPPLY CHAIN FOR THE SELECTED PRODUCT. THE IMPLEMENTATION IS A CUSTOMISED SOLUTION FOR THE MANUFACTURING UNIT FOR ITS PRODUCT, THIS THESIS WILL ENABLE THE IMPLEMENTATORS THE VALUABLE IMPLEMENTATION PROCEDURES THAT ONE HAS TO FOLLOW TO TAKE RIGHT BENEFIT FROM THIS TECHNOLOGY.</p>
39

RFID-avläsning med mobiltelefon

Svensson, Torbjörn January 2007 (has links)
<p>MobileReader är en mobil RFID (Radio Frequency Identification) applikation. Syftet med denna applikation är att skapa en RFID-läsare som skall gå att bära med sig ute på fältet. I första hand kommer läsaren att kunna läsa passiva RFID-taggar på Lågfrekvens-bandet (LF) samt att vara anpassad för nyare mobiltelefoner av tillverkaren Sony Ericsson. Detta examensarbete resulterade i ett program avsett för en Atmel ATmega16 mikroprocessor. Mikroprocessorn tar emot data från en befintlig LF-läsare via ett protokoll vid namn Wiegand 44. Den inlästa datan paketeras in i ett PDU-paket, Protocol Data Unit, vilket är det protokoll som mobiltelefoner använder för att skicka SMS mellan MS, Mobile System, och BS, Base System.</p> / <p>MobileReader is a mobile RFID (Radio Frequency Identification) application. The purpose of this application is to create a reader, that can be carried out in the field. This project will concentrate on reading passive RFID-tags on the Lowfrequency band (LF) and will be customized for a newer mobile phone manufactured by Sony Ericsson. This has resulted in a program written for the Atmel ATmega16 microcontroller. The microcontroller receives data from an already existing LF-reader using the Wiegand 44 protocol. The data will be converted into a PDU-packet, Protocol Data Unit, which is the protocol used by mobile phones to send SMS between MS, Mobile System, and BS, Base System.</p>
40

Analyse und Modellierung objektgebundener Datenflüsse in Wertschöpfungsketten

Petzold, Jana-Cordelia January 2009 (has links)
Zugl.: Cottbus, Techn. Univ., Diss.

Page generated in 0.0292 seconds