535 resultados para RFID authentication


Relevância:

10.00% 10.00%

Publicador:

Resumo:

O presente trabalho propõe-se superar o problema do funcionamento da tecnologia RFID num meio em presença de líquidos. Desta forma procedeu-se ao desenvolvimento de um rótulo que visa ser aplicado em garrafas de vinho ou champanhe. Incorporar RFID em rótulos permite maior velocidade e robustez na identificação do produto, sendo o principal interesse a sua versatilidade que permitirá associar diferentes funcionalidades. Para construir as antenas das tags foi necessário primeiramente estudar as caraterísticas do meio dielétrico, tendo sido necessário para isso, desenvolver um método de caraterização dielétrica. Estudou-se o papel e o vidro usando um método baseado em linhas de transmissão. Uma vez estudadas as caraterísticas dielétricas, foram dimensionadas e produzidas diferentes antenas, nomeadamente o rótulo com a presença de uma garrafa com água.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Comptar amb sistemes sofisticats de gestió o programes ERP (Enterprise Resource Planning) no és suficient per a les organitzacions. Per a què aquests recursos donin resultats adequats i actualitzats, la informació d’entrada ha de llegir-se de forma automàtica, per aconseguir estalviar en recursos, eliminació d’errors i assegurar el compliment de la qualitat. Per aquest motiu és important comptar amb eines i serveis d’identificació automàtica i col•lecció de dades. Els principals objectius a assolir (a partir de la introducció al lector de la importància dels sistemes logístics d’identificació en un entorn global d’alta competitivitat), són conèixer i comprendre el funcionament de les tres principals tecnologies existents al mercat (codis de barres lineals, codis de barres bidimensionals i sistemes RFID), veure en quin estat d’implantació es troba cadascuna i les seves principals aplicacions. Un cop realitzat aquest primer estudi es pretén comparar les tres tecnologies per o poder obtenir perspectives de futur en l’àmbit de l’autoidentificació. A partir de la situació actual i de les necessitats de les empreses, juntament amb el meravellós món que sembla obrir la tecnologia RFID (Radio Frequency Identification), la principal conclusió a la que s’arribarà és que malgrat les limitacions tècniques dels codis de barres lineals, aquests es troben completament integrats a tota la cadena logística gràcies a l’estandarització i la utilització d’un llenguatge comú, sota el nom de simbologies GTIN (Global Trade Item Number), durant tota la cadena de subministres que garanteixen total traçabilitat dels productes gràcies en part a la gestió de les bases de dades i del flux d’informació. La tecnologia RFUD amb l’EPC (Electronic Product Code) supera aquestes limitacions, convertint-se en el màxim candidat per a substituir els limitats codis de barres. Tot i això, RFID, amb l’EPC, no serà un adequat identificador logístic fins que es superin importants barreres, com són la falta d’estandarització i l’elevat cost d’implantació.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The identity [r]evolution is happening. Who are you, who am I in the information society? In recent years, the convergence of several factors - technological, political, economic - has accelerated a fundamental change in our networked world. On a technological level, information becomes easier to gather, to store, to exchange and to process. The belief that more information brings more security has been a strong political driver to promote information gathering since September 11. Profiling intends to transform information into knowledge in order to anticipate one's behaviour, or needs, or preferences. It can lead to categorizations according to some specific risk criteria, for example, or to direct and personalized marketing. As a consequence, new forms of identities appear. They are not necessarily related to our names anymore. They are based on information, on traces that we leave when we act or interact, when we go somewhere or just stay in one place, or even sometimes when we make a choice. They are related to the SIM cards of our mobile phones, to our credit card numbers, to the pseudonyms that we use on the Internet, to our email addresses, to the IP addresses of our computers, to our profiles... Like traditional identities, these new forms of identities can allow us to distinguish an individual within a group of people, or describe this person as belonging to a community or a category. How far have we moved through this process? The identity [r]evolution is already becoming part of our daily lives. People are eager to share information with their "friends" in social networks like Facebook, in chat rooms, or in Second Life. Customers take advantage of the numerous bonus cards that are made available. Video surveillance is becoming the rule. In several countries, traditional ID documents are being replaced by biometric passports with RFID technologies. This raises several privacy issues and might actually even result in changing the perception of the concept of privacy itself, in particular by the younger generation. In the information society, our (partial) identities become the illusory masks that we choose -or that we are assigned- to interplay and communicate with each other. Rights, obligations, responsibilities, even reputation are increasingly associated with these masks. On the one hand, these masks become the key to access restricted information and to use services. On the other hand, in case of a fraud or negative reputation, the owner of such a mask can be penalized: doors remain closed, access to services is denied. Hence the current preoccupying growth of impersonation, identity-theft and other identity-related crimes. Where is the path of the identity [r]evolution leading us? The booklet is giving a glance on possible scenarios in the field of identity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Micro-electromechanical systems (MEMS) provide vast improvements over existing sensing methods in the context of structural health monitoring (SHM) of highway infrastructure systems, including improved system reliability, improved longevity and enhanced system performance, improved safety against natural hazards and vibrations, and a reduction in life cycle cost in both operating and maintaining the infrastructure. Advancements in MEMS technology and wireless sensor networks provide opportunities for long-term continuous, real-time structural health monitoring of pavements and bridges at low cost within the context of sustainable infrastructure systems. The primary objective of this research was to investigate the use of MEMS in highway structures for health monitoring purposes. This study focused on investigating the use of MEMS and their potential applications in concrete through a comprehensive literature review, a vendor survey, and a laboratory study, as well as a small-scale field study. Based on the comprehensive literature review and vendor survey, the latest information available on off-the-shelf MEMS devices, as well as research prototypes, for bridge, pavement, and traffic applications were synthesized. A commercially-available wireless concrete monitoring system based on radio-frequency identification (RFID) technology and off-the-shelf temperature and humidity sensors were tested under controlled laboratory and field conditions. The test results validated the ability of the RFID wireless concrete monitoring system in accurately measuring the temperature both inside the laboratory and in the field under severe weather conditions. In consultation with the project technical advisory committee (TAC), the most relevant MEMS-based transportation infrastructure research applications to explore in the future were also highlighted and summarized.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A comprehensive field detection method is proposed that is aimed at developing advanced capability for reliable monitoring, inspection and life estimation of bridge infrastructure. The goal is to utilize Motion-Sensing Radio Transponders (RFIDS) on fully adaptive bridge monitoring to minimize the problems inherent in human inspections of bridges. We developed a novel integrated condition-based maintenance (CBM) framework integrating transformative research in RFID sensors and sensing architecture, for in-situ scour monitoring, state-of-the-art computationally efficient multiscale modeling for scour assessment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two portable Radio Frequency IDentification (RFID) systems (made by Texas Instruments and HiTAG) were developed and tested for bridge scour monitoring by the Department of Civil and Environmental Engineering at the University of Iowa (UI). Both systems consist of three similar components: 1) a passive cylindrical transponder of 2.2 cm in length (derived from transmitter/responder); 2) a low frequency reader (~134.2 kHz frequency); and 3) an antenna (of rectangular or hexagonal loop). The Texas Instruments system can only read one smart particle per time, while the HiTAG system was successfully modified here at UI by adding the anti-collision feature. The HiTAG system was equipped with four antennas and could simultaneously detect 1,000s of smart particles located in a close proximity. A computer code was written in C++ at the UI for the HiTAG system to allow simultaneous, multiple readouts of smart particles under different flow conditions. The code is written for the Windows XP operational system which has a user-friendly windows interface that provides detailed information regarding the smart particle that includes: identification number, location (orientation in x,y,z), and the instance the particle was detected.. These systems were examined within the context of this innovative research in order to identify the best suited RFID system for performing autonomous bridge scour monitoring. A comprehensive laboratory study that included 142 experimental runs and limited field testing was performed to test the code and determine the performance of each system in terms of transponder orientation, transponder housing material, maximum antenna-transponder detection distance, minimum inter-particle distance and antenna sweep angle. The two RFID systems capabilities to predict scour depth were also examined using pier models. The findings can be summarized as follows: 1) The first system (Texas Instruments) read one smart particle per time, and its effective read range was about 3ft (~1m). The second system (HiTAG) had similar detection ranges but permitted the addition of an anti-collision system to facilitate the simultaneous identification of multiple smart particles (transponders placed into marbles). Therefore, it was sought that the HiTAG system, with the anti-collision feature (or a system with similar features), would be preferable when compared to a single-read-out system for bridge scour monitoring, as the former could provide repetitive readings at multiple locations, which could help in predicting the scour-hole bathymetry along with maximum scour depth. 2) The HiTAG system provided reliable measures of the scour depth (z-direction) and the locations of the smart particles on the x-y plane within a distance of about 3ft (~1m) from the 4 antennas. A Multiplexer HTM4-I allowed the simultaneous use of four antennas for the HiTAG system. The four Hexagonal Loop antennas permitted the complete identification of the smart particles in an x, y, z orthogonal system as function of time. The HiTAG system can be also used to measure the rate of sediment movement (in kg/s or tones/hr). 3) The maximum detection distance of the antenna did not change significantly for the buried particles compared to the particles tested in the air. Thus, the low frequency RFID systems (~134.2 kHz) are appropriate for monitoring bridge scour because their waves can penetrate water and sand bodies without significant loss of their signal strength. 4) The pier model experiments in a flume with first RFID system showed that the system was able to successfully predict the maximum scour depth when the system was used with a single particle in the vicinity of pier model where scour-hole was expected. The pier model experiments with the second RFID system, performed in a sandbox, showed that system was able to successfully predict the maximum scour depth when two scour balls were used in the vicinity of the pier model where scour-hole was developed. 5) The preliminary field experiments with the second RFID system, at the Raccoon River, IA near the Railroad Bridge (located upstream of 360th street Bridge, near Booneville), showed that the RFID technology is transferable to the field. A practical method would be developed for facilitating the placement of the smart particles within the river bed. This method needs to be straightforward for the Department of Transportation (DOT) and county road working crews so it can be easily implemented at different locations. 6) Since the inception of this project, further research showed that there is significant progress in RFID technology. This includes the availability of waterproof RFID systems with passive or active transponders of detection ranges up to 60 ft (~20 m) within the water–sediment column. These systems do have anti-collision and can facilitate up to 8 powerful antennas which can significantly increase the detection range. Such systems need to be further considered and modified for performing automatic bridge scour monitoring. The knowledge gained from the two systems, including the software, needs to be adapted to the new systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we use a Terahertz (THz) time-domain system to image and analyze the structure of an artwork attributed to the Spanish artist Goya painted in 1771. The THz images show features that cannot be seen with optical inspection and complement data obtained with X-ray imaging that provide evidence of its authenticity, which is validated by other independent studies. For instance, a feature with a strong resemblance with one of Goya"s known signatures is seen in the THz images. In particular, this paper demonstrates the potential of THz imaging as a complementary technique along with X-ray for the verification and authentication of artwork pieces through the detection of features that remain hidden to optical inspection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Raman spectroscopy combined with chemometrics has recently become a widespread technique for the analysis of pharmaceutical solid forms. The application presented in this paper is the investigation of counterfeit medicines. This increasingly serious issue involves networks that are an integral part of industrialized organized crime. Efficient analytical tools are consequently required to fight against it. Quick and reliable authentication means are needed to allow the deployment of measures from the company and the authorities. For this purpose a method in two steps has been implemented here. The first step enables the identification of pharmaceutical tablets and capsules and the detection of their counterfeits. A nonlinear classification method, the Support Vector Machines (SVM), is computed together with a correlation with the database and the detection of Active Pharmaceutical Ingredient (API) peaks in the suspect product. If a counterfeit is detected, the second step allows its chemical profiling among former counterfeits in a forensic intelligence perspective. For this second step a classification based on Principal Component Analysis (PCA) and correlation distance measurements is applied to the Raman spectra of the counterfeits.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority of new emerging wireless applications. One promising way to alleviate the spectrum shortage problem is adopting a spectrum sharing paradigm in which frequency bands are used opportunistically. Cognitive radio is the key technology to enable this shift of paradigm.Cognitive radio networks are self-organized systems in which devices cooperate to use those spectrum ranges that are not occupied by licensed users. They carry out spectrum sensing in order to detect vacant channels that can be used for communication. Even though spectrum sensing is an active area of research, an important issue remains unsolved: the secure authentication of sensing reports. Not providing security enables the input of false data in the system thus empowering false results. This paper presents a distributed protocol based on wireless physical layer security, symmetric cryptography and one-way functions that allows determining a final sensing decision from multiple sources in a quick and secure way, as well as it preserves users¿ privacy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La informació biomètrica s'ha convertit en una tecnologia complementària a la criptografia que permet administrar còmodament les dades criptogràfiques. Són útils dues necessitats importants: en primer lloc, posar aquestes dades sempre a mà i, a més, fent fàcilment identificable el seu legítim propietari. En aquest article es proposa un sistema que integra la signatura biomètrica de reconeixement facial amb un esquema de signatura basat en la identitat, de manera que la cara de l'usuari esdevé la seva clau pública i la ID del sistema. D'aquesta manera, altres usuaris poden verificar els missatges utilitzant fotos del remitent, proporcionant un intercanvi raonable entre la seguretat del sistema i la usabilitat, així com una manera molt més senzilla d'autenticar claus públiques i processos de distribució.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cognitive radio networks sense spectrum occupancyand manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing is more accurate if jointly performed by several reliable nodes. Even though cooperative sensing is an active area of research, the secureauthentication of local sensing reports remains unsolved, thus empowering false results. This paper presents a distributed protocol based on digital signatures and hash functions, and ananalysis of its security features. The system allows determining a final sensing decision from multiple sources in a quick and secure way.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nomadic workers travel often between different work sites and work mainly outside their regular work place, but often require access to information stored electronically in corporate information systems. While working in field conditions, communication with an information system can be achieved by using mobile technology, i.e. mobile devices and wireless communication. This master’s thesis researches the use of mobile technology to assist nomadic field workers in their tasks. First different mobile technologies are compared and constraints that characterize mobile computing are explained. In the practical part of the thesis client software is developed for a mobile device. The software allows a nomadic construction worker to identify concrete elements and to acquire and update information concerning them. The characteristics of mobile computing and their effect on usability are taken into account when implementing the client software and the software is designed to be as easy to use as possible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Isotope ratio mass spectrometry (IRMS) has recently made its appearance in the forensic community. This high-precision technology has already been applied to a broad range of forensic fields such as illicit drugs, explosives and flammable liquids, where current, routinely used techniques have limited powers of discrimination. The conclusions drawn from the majority of these IRMS studies appear to be very promising. Used in a comparative process, as in food or drug authentication, the measurement of stable isotope ratios is a new and remarkable analytical tool for the discrimination or the identification of a substance with a definite source or origin. However, the research consists mostly of preliminary studies. The significance of this 'new' piece of information needs to be evaluated in light of a forensic framework to assess the actual potential and validity of IRMS, considering the characteristics of each field. Through the isotopic study of black powder, this paper aims at illustrating the potential of the method and the limitations of current knowledge in stable isotopes when facing forensic problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Erilaisten mobiiliverkkojen käytön yleistyessä nousee esiin uudenlaisia sovellusalueita, kuten esimerkiksi paikkatietoiset sovellukset. Mobiiliudesta johtuen sovellusten käyttötilanteet vaihtelevat. Käyttötilanteista voidaan kerätä tietoa ja käyttää tätä hyödyksi. Tilannetiedolla tarkoitetaan sovelluksen käyttötilanteeseen tai käyttäjään liittyvää lisätietoa. Paikka- ja tilannetietoisten sovellusten kehittäminen vaati monia ohjelmistokehitystä tukevia järjestelmiä. Tilannetiedon väljän määritelmän takia tilannetietoisten sovellusten kehitykselle ei ole vielä selkeitä toimintamalleja. Tilannetietoisten sovellusten kehitystä avustavia järjestelmiä on luotu etenkin tutkimuksessa, mutta nämä eivät ole vielä yleistyneet laajempaan käyttöön. Paikkatiedon käyttö sen sijaan on hyvinkin standardoitua, mutta paikkatieto nähdään vain osana tilannetietoa. Tässä diplomityössä toteutettiin paikka- ja tilannetiedon sovelluskehitystä tukevia järjestelmiä, joilla paikka- ja tilannetiedon hyödyntäminen sovelluksissa mahdollistettiin. WLAN - verkosta saadun paikkatiedon hyödyntämiseen toteutettiin SOAP -palvelurajapinta. Tilannetiedon hyödyntämiseksi toteutettiin MUPE -sovellusympäristöön välittäjäkomponentteja paikka-, sää- ja kuntopyörän harjoitustiedolle sekä RFID -havaintotiedoille. Näitä komponetteja käytettiin tilannetietoisten sovellusten luomiseen sekä tietoliikennetekniikan laitoksen codecamp -kursseilla, että tilannetietoisessa pelisovelluksessa. Työn tuloksena saatiin toimivia sovelluksia, ja välittäjäkomponentit sovellusten luomiseen. Työn tuloksena voidaan todeta, että ilman tilannetietoista sovelluskehitystä tukevia komponentteja, olisi tämäntyyppinen sovelluskehitys huomattavasti vaativampaa. Tukevat komponentit helpottavat sovelluskehitystä, mutta helposti myös rajaavat kehitysmahdollisuuksia.