81 resultados para Harrison, Frederic,


Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is growing interest in Discovery Services for locating RFID and supply chain data between companies globally, to obtain product lifecycle information for individual objects. Discovery Services are heralded as a means to find serial-level data from previously unknown parties, however more realistically they provide a means to reduce the communications load on the information services, the network and the requesting client application. Attempts to design a standardised Discovery Service will not succeed unless security is considered in every aspect of the design. In this paper we clearly show that security cannot be bolted-on in the form of access control, although this is also required. The basic communication model of the Discovery Service critically affects who shares what data with whom, and what level of trust is required between the interacting parties. © 2009 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Managing product information for product items during their whole lifetime is challenging, especially during their usage and end-of-life phases. A major challenge is how to keep a link between the product item and its associated information, which may be stored in backend systems of different organisations. In this paper, we analyse and compare three approaches for addressing this task, i.e. the EPC Network, DIALOG and WWAI. Copyright © 2006 IFAC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RFID is a technology that enables the automated capture of observations of uniquely identified physical objects as they move through supply chains. Discovery Services provide links to repositories that have traceability information about specific physical objects. Each supply chain party publishes records to a Discovery Service to create such links and also specifies access control policies to restrict who has visibility of link information, since it is commercially sensitive and could reveal inventory levels, flow patterns, trading relationships, etc. The requirement of being able to share information on a need-to-know basis, e.g. within the specific chain of custody of an individual object, poses a particular challenge for authorization and access control, because in many supply chain situations the information owner might not have sufficient knowledge about all the companies who should be authorized to view the information, because the path taken by an individual physical object only emerges over time, rather than being fully pre-determined at the time of manufacture. This led us to consider novel approaches to delegate trust and to control access to information. This paper presents an assessment of visibility restriction mechanisms for Discovery Services capable of handling emergent object paths. We compare three approaches: enumerated access control (EAC), chain-of-communication tokens (CCT), and chain-of-trust assertions (CTA). A cost model was developed to estimate the additional cost of restricting visibility in a baseline traceability system and the estimates were used to compare the approaches and to discuss the trade-offs. © 2012 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ten years ago the intelligent product model was introduced as a means of motivating a supply chain in which product or orders were central as opposed to the organizations that stored or delivered them. This notion of a physical product influencing its own movement through the supply chain was enabled by the evolution of low cost RFID systems which promised low cost connection between physical goods and networked information environments. In 2002 the notion of product intelligence was regarded as a useful but rather esoteric construct. However, in the intervening ten years there have been a number of technological advances coupled with an increasingly challenged business environment which make the prospects for intelligent product deployment seem more likely. This paper reviews a number of these developments and assesses their impact on the intelligent product approach. © 2012 IFAC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Various MgB2 wires with different sheath materials provided by Hyper Tech Research Inc., have been tested in the superconducting fault current limiter (SFCL) desktop tester at 24-26K in a self-field. Samples 1 and 2 are similarly fabricated monofilamentary MgB2 wires with a sheath of CuNi, except that sample 2 is doped with SiC and Mg addition. Sample 3 is a CuNi sheathed multifilamentary wire with Cu stabilization and Mg addition. All the samples with Nb barriers have the same diameter of 0.83mm and superconducting fractions ranging from 15% to 27% of the total cross section. They were heat-treated at temperatures of 700 °C for a hold time of 20-40min. Current limiting properties of MgB2 wires subjected to pulse overcurrents have been experimentally investigated in an AC environment in the self-field at 50Hz. The quench currents extracted from the pulse measurements were in a range of 200-328A for different samples, corresponding to an average engineering critical current density (Je) of around 4.8 × 10 4Acm-2 at 25K in the self-field, based on the 1νVcm-1 criterion. This work is intended to compare the quench behaviour in the Nb-barrier monofilamentary and multifilamentary MgB2 wires with CuNi and Cu/CuNi sheaths. The experimental results can be applied to the design of fault current limiter applications based on MgB2 wires. © IOP Publishing Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cheap to make and easy to shape, Magnesium Diboride (MgB2) throws the field of applied superconductivity wide open. Great efforts have been made to develop a super-conducting fault current limiter (SFCL) using MgB 2. With a superconducting transition temperature of 39 K, MgB 2 can be conveniently cooled with commercial cryocoolers. A cryogenic desktop test system, an ac pulse generation system and a real time data acquisition program in LabView/DAQmx were developed to investigate the quench behavior of MgB2 wires under pulse overcurrents at 25 K in self-field conditions. The experimental results on the current limitation behavior show the possibilities for using MgB2 for future SFCL applications. © 2007 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A laboratory scale desktop test system including a cryogenic system, an AC pulse generation system and a real time data acquisition program in LabView/DAQmx, has been developed to evaluate the quench properties of MgB 2 wires as an element in a superconducting fault current limiter under pulse overcurrents at 25K in self-field conditions. The MgB2 samples started from a superconducting state and demonstrated good current limiting properties characterized by a fast transition to the normal state during the first half of the cycle and a continuously limiting effect in the subsequent cycles without burnouts. The experimental and numerical simulation results on the quench behaviour indicate the feasibility of using MgB 2 for future superconducting fault current limiter (SFCL) applications. © IOP Publishing Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) technology allows automatic data capture from tagged objects moving in a supply chain. This data can be very useful if it is used to answer traceability queries, however it is distributed across many different repositories, owned by different companies. © 2012 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Service-Oriented Architecture (SOA) and Web Services (WS) offer advanced flexibility and interoperability capabilities. However they imply significant performance overheads that need to be carefully considered. Supply Chain Management (SCM) and Traceability systems are an interesting domain for the use of WS technologies that are usually deemed to be too complex and unnecessary in practical applications, especially regarding security. This paper presents an externalized security architecture that uses the eXtensible Access Control Markup Language (XACML) authorization standard to enforce visibility restrictions on trace-ability data in a supply chain where multiple companies collaborate; the performance overheads are assessed by comparing 'raw' authorization implementations - Access Control Lists, Tokens, and RDF Assertions - with their XACML-equivalents. © 2012 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores the evolving industrial control paradigm of product intelligence. The approach seeks to give a customer greater control over the processing of an order - by integrating technologies which allow for greater tracking of the order and methodologies which allow the customer [via the order] to dynamically influence the way the order is produced, stored or transported. The paper examines developments from four distinct perspectives: conceptual developments, theoretical issues, practical deployment and business opportunities. In each area, existing work is reviewed and open challenges for research are identified. The paper concludes by identifying four key obstacles to be overcome in order to successfully deploy product intelligence in an industrial application. © 2013 Elsevier Ltd. All rights reserved.