935 resultados para Radio frequency identification (RFID)
Resumo:
This research proposes a solution for integrating RFID - Radio Frequency Identification technology within a structure based on CFRPs - Carbon Fiber Reinforced Polymers. Therefore, the main objective is to use technology to monitor and track composite components during manufacturing and service life. The study can be divided into two macro-areas. The first portion of the research evaluates the impact of the composite materials used on transmitting the electromagnetic signal to and from the tag. RFID technology communicates through radio frequencies to to track and trace items associated with the tags. In the first instance, a feasibility study was carried out to assess using commercially available tags. Then, after evaluating different solutions, it was decided to incorporate the tags into coupons during production. The second portion of the research is focused on evaluating the impact on the composite material's resistance to tag embedding. It starts with designing tensile test specimens through the FEM model with different housing configurations. Subsequently, the best configuration was tested in the facilities of the In the Faculty of Aerospace Engineering at TU Delft, particularly in the Structure & Materials Laboratory, two tests were conducted: the first one based on ASTM D3039/D3039 - 14 - Standard Test Method for Tensile Properties of Polymer Matrix Composite Materials, the second one dividing the path to failure into failure intervals in a load-unload-reload. Both tests were accompanied by instruments such as DIC, AE, C-Scan and Optical Microscopes. The expected result of the inclusion of RFID tags in composite components is that it brings added value to the parts with which it is associated without affecting too much its mechanical properties. This comes first from the automatic identification of RFID during the production cycle and its useful life. As a result, improvements were made in the design of production facilities.
Resumo:
The continuous and swift progression of both wireless and wired communication technologies in today's world owes its success to the foundational systems established earlier. These systems serve as the building blocks that enable the enhancement of services to cater to evolving requirements. Studying the vulnerabilities of previously designed systems and their current usage leads to the development of new communication technologies replacing the old ones such as GSM-R in the railway field. The current industrial research has a specific focus on finding an appropriate telecommunication solution for railway communications that will replace the GSM-R standard which will be switched off in the next years. Various standardization organizations are currently exploring and designing a radiofrequency technology based standard solution to serve railway communications in the form of FRMCS (Future Railway Mobile Communication System) to substitute the current GSM-R. Bearing on this topic, the primary strategic objective of the research is to assess the feasibility to leverage on the current public network technologies such as LTE to cater to mission and safety critical communication for low density lines. The research aims to identify the constraints, define a service level agreement with telecom operators, and establish the necessary implementations to make the system as reliable as possible over an open and public network, while considering safety and cybersecurity aspects. The LTE infrastructure would be utilized to transmit the vital data for the communication of a railway system and to gather and transmit all the field measurements to the control room for maintenance purposes. Given the significance of maintenance activities in the railway sector, the ongoing research includes the implementation of a machine learning algorithm to detect railway equipment faults, reducing time and human analysis errors due to the large volume of measurements from the field.
Resumo:
The Internet of Things (IoT) is a concept that can foster the emergence of innovative applications. In order to minimize parents’s concerns about their children’s safety, this paper presents the design of a smart Internet of Things system for identifying dangerous situations. The system will be based on real time collection and analysis of physiological signals monitored by non-invasive and non-intrusive sensors, Frequency IDentification (RFID) tags and a Global Positioning System (GPS) to determine when a child is in danger. The assumption of a state of danger is made taking into account the validation of a certain number of biometric reactions to some specific situations and according to a self-learning algorithm developed for this architecture. The results of the analysis of data collected and the location of the child will be able in real time to child’s care holders in a web application.
Resumo:
O jogo e o lazer são elementos importantes para o desenvolvimento das crianças. O objetivo geral desta tese foi o de investigar o modo como o jogo e o lazer estão relacionados com diferentes aspetos das competências emocional e social das crianças e jovens. Nesta tese foram investigados três aspetos do jogo: o tempo, a forma e o nível social, diferentes formas de lazer, e vários elementos chave do funcionamento sócio-emocional, através da combinação de observações naturalistas, tarefas, questionários e de um método inovador de mensuração, baseado em Identificação por Rádio-Frequência. O panorama que surge dos estudos incluídos nesta tese é que o jogo e o lazer estão relacionados com o funcionamento sócio-emocional, embora de formas distintas, e por vezes inesperadas. Os estudos no recreio revelaram que as crianças envolvem-se predominantemente no jogo de atividade física. Contudo, enquanto que uma forma de jogo de atividade física, o jogo de exercício, foi associado a melhor competência social, a outra forma, o jogo de luta-e-perseguição, foi associado à agressividade. O facto de o jogo de faz-de-conta, em estudos anteriores, ter sido maioritariamente estudado em espaços interiores, pode explicar o porquê das associações negativas encontradas entre o jogo de faz-de-conta, quer em grupo, quer solitário (nas raparigas) e a competência sócio-emocional, que contrastam com a literatura. De facto, as crianças que não conseguem juntar-se aos seus pares no jogo de exercício podem optar por esta alternativa, o que sugere que crianças socialmente competentes poderão retirar maior vantagem das oportunidades existentes, adaptando melhor os seus comportamentos de jogo. As crianças mais velhas têm geralmente mais liberdade de decisão sobre o seu tempo de lazer. Quando perguntámos às crianças mais velhas e aos adolescentes como passavam a sua semana, as atividades de ecrã destacaram-se. Contudo, as atividades de ecrã e as atividades intelectuais foram relacionadas a mais problemas de saúde mental, enquanto que as atividades desportivas foram associadas a melhor saúde mental. Concluindo, diferentes formas de jogo e de lazer podem ter diferentes funções, de uma forma positiva ou negativa, dependendo da situação em que a criança se encontra.
Resumo:
This report describes the results of the research project investigating the use of advanced field data acquisition technologies for lowa transponation agencies. The objectives of the research project were to (1) research and evaluate current data acquisition technologies for field data collection, manipulation, and reporting; (2) identify the current field data collection approach and the interest level in applying current technologies within Iowa transportation agencies; and (3) summarize findings, prioritize technology needs, and provide recommendations regarding suitable applications for future development. A steering committee consisting oretate, city, and county transportation officials provided guidance during this project. Technologies considered in this study included (1) data storage (bar coding, radio frequency identification, touch buttons, magnetic stripes, and video logging); (2) data recognition (voice recognition and optical character recognition); (3) field referencing systems (global positioning systems [GPS] and geographic information systems [GIs]); (4) data transmission (radio frequency data communications and electronic data interchange); and (5) portable computers (pen-based computers). The literature review revealed that many of these technologies could have useful applications in the transponation industry. A survey was developed to explain current data collection methods and identify the interest in using advanced field data collection technologies. Surveys were sent out to county and city engineers and state representatives responsible for certain programs (e.g., maintenance management and construction management). Results showed that almost all field data are collected using manual approaches and are hand-carried to the office where they are either entered into a computer or manually stored. A lack of standardization was apparent for the type of software applications used by each agency--even the types of forms used to manually collect data differed by agency. Furthermore, interest in using advanced field data collection technologies depended upon the technology, program (e.g.. pavement or sign management), and agency type (e.g., state, city, or county). The state and larger cities and counties seemed to be interested in using several of the technologies, whereas smaller agencies appeared to have very little interest in using advanced techniques to capture data. A more thorough analysis of the survey results is provided in the report. Recommendations are made to enhance the use of advanced field data acquisition technologies in Iowa transportation agencies: (1) Appoint a statewide task group to coordinate the effort to automate field data collection and reporting within the Iowa transportation agencies. Subgroups representing the cities, counties, and state should be formed with oversight provided by the statewide task group. (2) Educate employees so that they become familiar with the various field data acquisition technologies.
Resumo:
Sähköisen liiketoiminnan ja mobiliteetin konvergenssi yhdessä teknologisen innovaation kiihtyvän vauhdin kanssa ovat saaneet aikaan kiinnostusta langattomia liiketoimintaratkaisuja kohtaan. Tämän diplomityön tavoitteena oli tutkia sähköisen liiketoiminnan langattomien sovellusten arviointi- ja kehitysprosessia. Työ keskittyy tarkastelemaan paperiteollisuuden toimitusketjun langatonta seurantaa. Tutkimuksessa esitetään langattoman sähköisen liiketoiminnan määritelmä, kuvaillaan langattomuuden eri sovellusalueita ja sovellusten arviointi- ja kehitysprosessin strategisia sekä teknologisia ulottuvuuksia. Työ luo viitekehyksen, jonka avulla tarkastella langattomien teknologioiden merkitystä logistiikassa. Tutkimuksen merkittävin tulos on prosessimalli sovellusten arvioimiseksi ja kehittämiseksi. Mallilla kehitetty langaton sovellus osoittautui tarkastelussa hyödylliseksi toimitusketjun hallinnassa.
Resumo:
En este documento se evidencia como el desempeño organizacional de una empresa, entendido como el rendimiento superior de la misma, se ve modificado por las prácticas o metodologías utilizadas, aplicadas e integradas a cada uno de los componentes de la Cadena de suministros. Es así que el propósito principal es demostrar cual es la relación entre los componentes de la Cadena de Suministros y su gestión sobre los rendimientos económicos de la empresa. De esa manera se encontraron múltiples actividades que toman lugar en los procesos característicos de cada uno de los componentes de la cadena de suministros y que al final nos presentan una variabilidad sobre los rendimientos de la empresa. Cabe recalcar que la investigación se realizó con respecto a empresas pertenecientes al sector manufacturero y abarca una buena parte de este. La importancia que tiene la investigación, es el haber entregado como resultado, el conocimiento sobre algunas de las practicas más utilizadas en el sector en cada uno de sus componentes, lo cual hace de la Cadena de suministros, un factor por excelencia para ser tratado e implementado con el fin de alcanzar mayores rendimientos económicos a nivel de empresa. En la investigación se utilizaron los casos de empresas reales tanto nacionales como internacionales y se encontraron situaciones claves que evidenciaban la hipótesis de la relación entre la cadena de suministros y el desempeño organizacional. Es por ello, que si bien es ahora cierto, que las actividades desarrolladas en los componentes de la Cadena de Suministros de las empresas influyen en el incremento de los rendimientos, es importante que las empresas conozcan de esta información para tener una idea de cómo desarrollar ventajas competitivas que los posicionen como empresa y les genere entonces mayores rendimientos, o por el contrario, les genere ahorros en costos y por ende altos beneficios y nuevas inversiones en prácticas que a la larga volverá a la empresa en un organismo eficientes y próspero.
Resumo:
Tracking individual animals within large groups is increasingly possible, offering an exciting opportunity to researchers. Whereas previously only relatively indistinguishable groups of individual animals could be observed and combined into pen level data, we can now focus on individual actors within these large groups and track their activities across time and space with minimal intervention and disturbance. The development is particularly relevant to the poultry industry as, due to a shift away from battery cages, flock sizes are increasingly becoming larger and environments more complex. Many efforts have been made to track individual bird behavior and activity in large groups using a variety of methodologies with variable success. Of the technologies in use, each has associated benefits and detriments, which can make the approach more or less suitable for certain environments and experiments. Within this article, we have divided several tracking systems that are currently available into two major categories (radio frequency identification and radio signal strength) and review the strengths and weaknesses of each, as well as environments or conditions for which they may be most suitable. We also describe related topics including types of analysis for the data and concerns with selecting focal birds.
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.
Resumo:
Social interactions at the playground have been represented as a rich learning opportunity to hone and master social skills at pre- school years. Specifically, all forms of social play (fantasy, role, ex- ercise or rough-and-tumble) have been related to children’s social competence. The main goal of this study was to examine whether it is a certain kind of social play which facilitates the development of social competence, or if it is just the opportunity for interacting during recess that provides children with an optimal environment for social learning. A total of 73 preschoolers (4–6 years old) were videotaped at the school’s playground. Teachers provided assess- ments of children’s social competence. Children’s interactions at the playground were assessed through an innovative measuring method, based on radio-frequency identification devices. The results showed a positive association between exercise play and children’s social competence. In contrast with the literature, both forms of pretend play, fantasy and role play were unrelated to children’s social competence. Smaller peer groups and longer interactions also demonstrated a positive association with these preschoolers’ social competence. The study shows the importance of outdoor physical play for preschoolers’ social success. More- over, the study suggests that the environment in which children play has an important effect on the adaptive nature of their play.
Resumo:
Social interactions at the playground have been represented as a rich learning opportunity to hone and master social skills at preschool years. Specifically, all forms of social play (fantasy, role, exercise or rough-and-tumble) have been related to children’s social competence. The main goal of this study was to examine whether it is a certain kind of social play which facilitates the development of social competence, or if it is just the opportunity for interacting during recess that provides children with an optimal environment for social learning. A total of 73 preschoolers (4–6 years old) were videotaped at the school’s playground. Teachers provided assessments of children’s social competence. Children’s interactions at the playground were assessed through an innovative measuring method, based on radio-frequency identification devices. The results showed a positive association between exercise play and children’s social competence. In contrast with the literature, both forms of pretend play, fantasy and role play were unrelated to children’s social competence. Smaller peer groups and longer interactions also demonstrated a positive association with these preschoolers’ social competence. The study shows the importance of outdoor physical play for preschoolers’ social success. Moreover, the study suggests that the environment in which children play has an important effect on the adaptive nature of their play.
Resumo:
El proyecto tiene como principal objetivo lograr mejorar el enlace entre el tag y el Reader, en un sistema RFID (Radio Frecuency IDentification). El mismo será abordado desde dos ópticas de trabajo; La primera, es lograr el mismo alcance de los sistemas actuales, reduciendo la potencia aportada por el Reader. En esta situación su principal aplicación será en los implantes en seres vivos, disminuyendo la radiación electromagnética en los mismos. La segunda, es lograr aumentar la distancia del alcance del enlace, sin aumentar la potencia del Reader.
Resumo:
Un sistema inalámbrico en UHF puede ser utilizado tanto para la identificación de productos como para la adquisición de datos. Si se encuadra en la identificación se está refiriendo a sistemas “RFID” y si se encuadra en la adquisición de datos se está en presencia de una “Red de Sensores Inalámbrica”. El presente proyecto pretende desarrollar una plataforma de discusión permanente sobre estas tecnología que permita la optimización de los diferentes estamentos de la red. El proyecto tiene como objetivo general mejorar las prestaciones del vinculo entre los distintos elementos en un sistema RFID (Radio Frecuency Identification) o WSN (Wireless Sensor Network). En tal sentido, se propone en una primer línea de investigación, el desarrollo de un modelo que caracterice una red inalámbrica de sensores en UHF, permitiendo luego simularla bajo distintas condiciones. El objetivo es tener una herramienta con la cual se pueda estudiar y simular el comportamiento de una red con varios nodos. Una segunda línea de trabajo aborda el problema del test para sistemas RFID y WSN, con énfasis en nodos activos y pasivos diseñados con circuitos analógicos y digitales configurables y componentes comerciales. Así, se propone el desarrollo de estrategias de test de bajo consumo y alto desempeño focalizadas en las secciones analógicas, de conversión y digitales configurables del nodo. Los trabajos específicos planteados para responder a los objetivos que se pretenden son: La caracterización y modelado del enlace inalámbrico en UHF; La caracterización y modelado del transceptor en sus distintas etapas; La caracterización y modelado de la red con los distintos nodos; El estudio de nuevos diseños de antenas; El estudio de distintas adaptaciones de la etapa de RF con la antena; El estudio de alternativas de distintas modulaciones de las señales a transmitir; Proponer estrategias de simulación y/o emulación de fallas para sistemas analógicos y digitales que permita la evaluación de las estrategias de test y de los mecanismos de recuperación ante fallas; Evaluar el funcionamiento en laboratorio y en campo de los nodos y el lector