29 resultados para RFID-Einsatzpotenziale


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The regulation of overweight trucks is of increasing importance. Quickly growing heavy vehicle volumes over-proportionally contribute to roadway damage. Raising maintenance costs and compromised road safety are also becoming a major concern to managing agencies. Minimizing pavement wear is done by regulating overloaded trucks on major highways at weigh stations. However, due to lengthy inspections and insufficient capacities, weigh stations tend to be inefficient. New practices, using Radio Frequency Identification (RFID) transponders and weigh-in-motion technologies, called preclearance programs, have been set up in a number of countries. The primary aim of this study is to investigate the current issues with regard to the implementation and operation of the preclearance program. The State of Queensland, Australia, is used as a case study. The investigation focuses on three aspects; the first emphasizes on identifying the need for improvement of the current regulation programs in Queensland. Second, the operators of existing preclearance programs are interviewed for their lessons-learned and the marketing strategies used for promoting their programs. The trucking companies in Queensland are interviewed for their experiences with the current weighing practices and attitudes toward the potential preclearance system. Finally, the estimated benefit of the preclearance program deployment in Queensland is analyzed. The penultimate part brings the former four parts together and provides the study findings and recommendations. The framework and study findings could be valuable inputs for other roadway agencies considering a similar preclearance program or looking to promote their existing ones.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile/tower cranes are the most essential forms of construction plant in use in the construction industry but are also the subject of several safety issues. Of these, blind lifting has been found to be one of the most hazardous of crane operations. To improve the situation, a real-time monitoring system that integrates the use of a Global Positioning System (GPS) and Radio Frequency Identification (RFID) is developed. This system aims to identify unauthorized work or entrance of personnel within a pre-defined risk zone by obtaining positioning data of both site workers and the crane. The system alerts to the presence of unauthorized workers within a risk zone——currently defined as 3m from the crane. When this happens, the system suspends the power of the crane and a warning signal is generated to the safety management team. In this way the system assists the safety management team to manage the safety of hundreds of workers simultaneously. An onsite trial with debriefing interviews is presented to illustrate and validate the system in use.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

CubIT is a multi-user, large-scale presentation and collaboration framework installed at the Queensland University of Technology’s (QUT) Cube facility, an interactive facility made up 48 multi-touch screens and very large projected display screens. CubIT was built to make the Cube facility accessible to QUT’s academic and student population. The system allows users to upload, interact with and share media content on the Cube’s very large display surfaces. CubIT implements a unique combination of features including RFID authentication, content management through multiple interfaces, multi-user shared workspace support, drag and drop upload and sharing, dynamic state control between different parts of the system and execution and synchronisation of the system across multiple computing nodes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently, vision-based systems have been deployed in professional sports to track the ball and players to enhance analysis of matches. Due to their unobtrusive nature, vision-based approaches are preferred to wearable sensors (e.g. GPS or RFID sensors) as it does not require players or balls to be instrumented prior to matches. Unfortunately, in continuous team sports where players need to be tracked continuously over long-periods of time (e.g. 35 minutes in field-hockey or 45 minutes in soccer), current vision-based tracking approaches are not reliable enough to provide fully automatic solutions. As such, human intervention is required to fix-up missed or false detections. However, in instances where a human can not intervene due to the sheer amount of data being generated - this data can not be used due to the missing/noisy data. In this paper, we investigate two representations based on raw player detections (and not tracking) which are immune to missed and false detections. Specifically, we show that both team occupancy maps and centroids can be used to detect team activities, while the occupancy maps can be used to retrieve specific team activities. An evaluation on over 8 hours of field hockey data captured at a recent international tournament demonstrates the validity of the proposed approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

WG-7 is a stream cipher based on WG stream cipher and has been designed by Luo et al. (2010). This cipher is designed for low cost and lightweight applications (RFID tags and mobile phones, for instance). This paper addresses cryptographic weaknesses of WG-7 stream cipher. We show that the key stream generated by WG-7 can be distinguished from a random sequence after knowing 213.5 keystream bits and with a negligible error probability. Also, we investigate the security of WG-7 against algebraic attacks. An algebraic key recovery attack on this cipher is proposed. The attack allows to recover both the internal state and the secret key with the time complexity about 2/27.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Social Public Display to Facilitate Shared Encounters in Coworking Spaces The idea behind ‘Gelatine’ is a system that facilitates shared encounters between coworkers and library users by allowing them to digitally ‘check in’ at a work space. Gelatine displays skills, areas of interest, and needs of currently present coworkers on a public screen. The system provides an online / mobile website for users to create a personal profile with keywords (‘tags’) that describe their skills, areas of interests, as well as areas that they have a problem in or want to learn more about. This profile information is linked to their RFID membership card, which they can swipe at one of the ‘checkin-points’ at the entrance or specific sub locations such as individual desks or coffee kiosk to confirm their presence in the space.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we describe CubIT, a multi-user presentation and collaboration system installed at the Queensland University of Technology’s (QUT) Cube facility. The ‘Cube’ is an interactive visualisation facility made up of five very large-scale interactive multi-panel wall displays, each consisting of up to twelve 55-inch multi-touch screens (48 screens in total) and massive projected display screens situated above the display panels. The paper outlines the unique design challenges, features, implementation and evaluation of CubIT. The system was built to make the Cube facility accessible to QUT’s academic and student population. CubIT enables users to easily upload and share their own media content, and allows multiple users to simultaneously interact with the Cube’s wall displays. The features of CubIT were implemented via three user interfaces, a multi-touch interface working on the wall displays, a mobile phone and tablet application and a web-based content management system. Each of these interfaces plays a different role and offers different interaction mechanisms. Together they support a wide range of collaborative features including multi-user shared workspaces, drag and drop upload and sharing between users, session management and dynamic state control between different parts of the system. The results of our evaluation study showed that CubIT was successfully used for a variety of tasks, and highlighted challenges with regards to user expectations regarding functionality as well as issues arising from public use.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

π-Conjugated polymers are the most promising semiconductor materials to enable printed organic thin film transistors (OTFTs) due to their excellent solution processability and mechanical robustness. However, solution-processed polymer semiconductors have shown poor charge transport properties mainly originated from the disordered polymer chain packing in the solid state as compared to the thermally evaporated small molecular organic semiconductors. The low charge carrier mobility, typically < 0.1 cm2 /V.s, of polymer semiconductors poses a challenge for most intended applications such as displays and radio-frequency identification (RFID) tags. Here we present our recent results on the dike topyrrolopyrrole (DPP)-based polymers and demonstrate that when DPP is combined with appropriate electron donating moieties such as thiophene and thienothiophene, very high charge carrier mobility values of ~1 cm2/V.s could be achieved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For the past few years, research works on the topic of secure outsourcing of cryptographic computations has drawn significant attention from academics in security and cryptology disciplines as well as information security practitioners. One main reason for this interest is their application for resource constrained devices such as RFID tags. While there has been significant progress in this domain since Hohenberger and Lysyanskaya have provided formal security notions for secure computation delegation, there are some interesting challenges that need to be solved that can be useful towards a wider deployment of cryptographic protocols that enable secure outsourcing of cryptographic computations. This position paper brings out these challenging problems with RFID technology as the use case together with our ideas, where applicable, that can provide a direction towards solving the problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently Gao et al. proposed a lightweight RFID mutual authentication protocol [3] to resist against intermittent position trace attacks and desynchronization attacks and called it RIPTA-DA. They also verified their protocol’s security by data reduction method with the learning parity with noise (LPN) and also formally verified the functionality of the proposed scheme by Colored Petri Nets. In this paper, we investigate RIPTA-DA’s security. We present an efficient secret disclosure attack against the protocol which can be used to mount both de-synchronization and traceability attacks against the protocol. Thus our attacks show that RIPTA-DA protocol is not a RIPTA-DA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work proposes a supermarket optimization simulation model called Swarm-Moves is based on self organized complex system studies to identify parameters and their values that can influence customers to buy more on impulse in a given period of time. In the proposed model, customers are assumed to have trolleys equipped with technology like RFID that can aid the passing of products' information directly from the store to them in real-time and vice-versa. Therefore, they can get the information about other customers purchase patterns and constantly informing the store of their own shopping behavior. This can be easily achieved because the trolleys "know" what products they contain at any point. The Swarm-Moves simulation is the virtual supermarket providing the visual display to run and test the proposed model. The simulation is also flexible to incorporate any given model of customers' behavior tailored to particular supermarket, settings, events or promotions. The results, although preliminary, are promising to use RFID technology for marketing products in supermarkets and provide several dimensions to look for influencing customers via feedback, real-time marketing, target advertisement and on-demand promotions. ©2009 IEEE.