535 resultados para RFID authentication


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Seafood products fraud, the misrepresentation of them, have been discovered all around the world in different forms as false labeling, species substitution, short-weighting or over glazing in order to hide the correct identity, origin or weight of the seafood products. Due to the value of seafood products such as canned tuna, swordfish or grouper, these species are the subject of the commercial fraud is mainly there placement of valuable species with other little or no value species. A similar situation occurs with the shelled shrimp or shellfish that are reduced into pieces for the commercialization. Food fraud by species substitution is an emerging risk given the increasingly global food supply chain and the potential food safety issues. Economic food fraud is committed when food is deliberately placed on the market, for financial gain deceiving consumers (Woolfe, M. & Primrose, S. 2004). As a result of the increased demand and the globalization of the seafood supply, more fish species are encountered in the market. In this scenary, it becomes essential to unequivocally identify the species. The traditional taxonomy, based primarily on identification keys of species, has shown a number of limitations in the use of the distinctive features in many animal taxa, amplified when fish, crustacean or shellfish are commercially transformed. Many fish species show a similar texture, thus the certification of fish products is particularly important when fishes have undergone procedures which affect the overall anatomical structure, such as heading, slicing or filleting (Marko et al., 2004). The absence of morphological traits, a main characteristic usually used to identify animal species, represents a challenge and molecular identification methods are required. Among them, DNA-based methods are more frequently employed for food authentication (Lockley & Bardsley, 2000). In addition to food authentication and traceability, studies of taxonomy, population and conservation genetics as well as analysis of dietary habits and prey selection, also rely on genetic analyses including the DNA barcoding technology (Arroyave & Stiassny, 2014; Galimberti et al., 2013; Mafra, Ferreira, & Oliveira, 2008; Nicolé et al., 2012; Rasmussen & Morrissey, 2008), consisting in PCR amplification and sequencing of a COI mitochondrial gene specific region. The system proposed by P. Hebert et al. (2003) locates inside the mitochondrial COI gene (cytochrome oxidase subunit I) the bioidentification system useful in taxonomic identification of species (Lo Brutto et al., 2007). The COI region, used for genetic identification - DNA barcode - is short enough to allow, with the current technology, to decode sequence (the pairs of nucleotide bases) in a single step. Despite, this region only represents a tiny fraction of the mitochondrial DNA content in each cell, the COI region has sufficient variability to distinguish the majority of species among them (Biondo et al. 2016). This technique has been already employed to address the demand of assessing the actual identity and/or provenance of marketed products, as well as to unmask mislabelling and fraudulent substitutions, difficult to detect especially in manufactured seafood (Barbuto et al., 2010; Galimberti et al., 2013; Filonzi, Chiesa, Vaghi, & Nonnis Marzano, 2010). Nowadays,the research concerns the use of genetic markers to identify not only the species and/or varieties of fish, but also to identify molecular characters able to trace the origin and to provide an effective control tool forproducers and consumers as a supply chain in agreementwith local regulations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trabalho Final de Mestrado para obtenção do grau de Mestre em Engenharia Informática e de Computadores

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases. Intruders becoming smarter in obfuscating web requests to evade detection combined with increasing volumes of web traffic from the Internet of Things (IoT), cloud-hosted and on-premise business applications have made it evident that the existing approaches of mostly static signature lack the ability to cope with novel signatures. A SQLIA detection and prevention solution can be achieved through exploring an alternative bio-inspired supervised learning approach that uses input of labelled dataset of numerical attributes in classifying true positives and negatives. We present in this paper a Numerical Encoding to Tame SQLIA (NETSQLIA) that implements a proof of concept for scalable numerical encoding of features to a dataset attributes with labelled class obtained from deep web traffic analysis. In the numerical attributes encoding: the model leverages proxy in the interception and decryption of web traffic. The intercepted web requests are then assembled for front-end SQL parsing and pattern matching by applying traditional Non-Deterministic Finite Automaton (NFA). This paper is intended for a technique of numerical attributes extraction of any size primed as an input dataset to an Artificial Neural Network (ANN) and statistical Machine Learning (ML) algorithms implemented using Two-Class Averaged Perceptron (TCAP) and Two-Class Logistic Regression (TCLR) respectively. This methodology then forms the subject of the empirical evaluation of the suitability of this model in the accurate classification of both legitimate web requests and SQLIA payloads.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Esta tese consiste no estudo, implementação e desenvolvimento da infra-estrutura para o projecto SEMCABO-WIFI. Este projecto está inserido na empresa Sem¬ Cabo, com o objectivo de levar a Internet aos clientes sob a forma de hotspots ou no acesso à ultima milha (Last Míle Access) à casa dos residentes. O projecto também deu origem à própria empresa, levando esta a ISP desde Setembro de 2007. Numa primeira fase, é feita abordagem a Sistemas de Authentícatíon, Authorization e Ac­countíng para ISPs, na vertente WI-FI e apresentadas possíveis soluções comercias e open source. Em seguida, é apresentado a empresa SemCabo, vertente comercial e tecnológica. O sistema base da SemCabo é referido, contemplando a tecnologia de suporte, rede, equipamentos activos, módulos de emissão de sinal WI-FI, segurança, monitorização e portal de autenticação. Os servidores base são indicados posteriormente, sendo efectuado a apresentação de todos os servidores com suporte ao projecto, incluindo alguns pormenores de configuração. São apresentados equipa­ mentos e sistemas utilizados para controlo de acesso à rede (NAS), sendo igualmente descritos pormenores de configuração. ABSTRACT; This thesis is about the study, implementation and development of the infrastructure created for the SEMCABO-WIFI project. This project is inserted in the company SemCabo, with the objective to bring the Internet to costumers in the form of hots­pots or access in last mile to the house of residents. The project also originated the company and led the company to ISP since September 2007. ln the first fase, the approach is about Systems Authentication, Authorization and Accounting for WISPs and presented possible commercial and open source solutions. ln next, the SemCabo company is presented and described their technological and commercial aspects. The base system of the SemCabo is refered, considering the support technology, network equipment, modules emission signal WI-FI, security, monitoring and portal authentication module. Base servers of the SemCabo project are shown, a presentation of all the servers that support the project is made, including some details of the configuration. The equipment and systems used to control network access (NAS) are presented, details of configuration are also described.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2016.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The proliferation of new mobile communication devices, such as smartphones and tablets, has led to an exponential growth in network traffic. The demand for supporting the fast-growing consumer data rates urges the wireless service providers and researchers to seek a new efficient radio access technology, which is the so-called 5G technology, beyond what current 4G LTE can provide. On the other hand, ubiquitous RFID tags, sensors, actuators, mobile phones and etc. cut across many areas of modern-day living, which offers the ability to measure, infer and understand the environmental indicators. The proliferation of these devices creates the term of the Internet of Things (IoT). For the researchers and engineers in the field of wireless communication, the exploration of new effective techniques to support 5G communication and the IoT becomes an urgent task, which not only leads to fruitful research but also enhance the quality of our everyday life. Massive MIMO, which has shown the great potential in improving the achievable rate with a very large number of antennas, has become a popular candidate. However, the requirement of deploying a large number of antennas at the base station may not be feasible in indoor scenarios. Does there exist a good alternative that can achieve similar system performance to massive MIMO for indoor environment? In this dissertation, we address this question by proposing the time-reversal technique as a counterpart of massive MIMO in indoor scenario with the massive multipath effect. It is well known that radio signals will experience many multipaths due to the reflection from various scatters, especially in indoor environments. The traditional TR waveform is able to create a focusing effect at the intended receiver with very low transmitter complexity in a severe multipath channel. TR's focusing effect is in essence a spatial-temporal resonance effect that brings all the multipaths to arrive at a particular location at a specific moment. We show that by using time-reversal signal processing, with a sufficiently large bandwidth, one can harvest the massive multipaths naturally existing in a rich-scattering environment to form a large number of virtual antennas and achieve the desired massive multipath effect with a single antenna. Further, we explore the optimal bandwidth for TR system to achieve maximal spectral efficiency. Through evaluating the spectral efficiency, the optimal bandwidth for TR system is found determined by the system parameters, e.g., the number of users and backoff factor, instead of the waveform types. Moreover, we investigate the tradeoff between complexity and performance through establishing a generalized relationship between the system performance and waveform quantization in a practical communication system. It is shown that a 4-bit quantized waveforms can be used to achieve the similar bit-error-rate compared to the TR system with perfect precision waveforms. Besides 5G technology, Internet of Things (IoT) is another terminology that recently attracts more and more attention from both academia and industry. In the second part of this dissertation, the heterogeneity issue within the IoT is explored. One of the significant heterogeneity considering the massive amount of devices in the IoT is the device heterogeneity, i.e., the heterogeneous bandwidths and associated radio-frequency (RF) components. The traditional middleware techniques result in the fragmentation of the whole network, hampering the objects interoperability and slowing down the development of a unified reference model for the IoT. We propose a novel TR-based heterogeneous system, which can address the bandwidth heterogeneity and maintain the benefit of TR at the same time. The increase of complexity in the proposed system lies in the digital processing at the access point (AP), instead of at the devices' ends, which can be easily handled with more powerful digital signal processor (DSP). Meanwhile, the complexity of the terminal devices stays low and therefore satisfies the low-complexity and scalability requirement of the IoT. Since there is no middleware in the proposed scheme and the additional physical layer complexity concentrates on the AP side, the proposed heterogeneous TR system better satisfies the low-complexity and energy-efficiency requirement for the terminal devices (TDs) compared with the middleware approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação de Mestrado, Engenharia Electrónica e Telecomunicações, Faculdade de Ciências e Tecnologia, Universidade do Algarve, 2014

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study examined variations in the Fulton condition factor, chemical composition, and stable isotopes of carbon and nitrogen in the Brazilian freshwater fish cachara (Pseudoplatystoma fasciatum), comparing farmed and wild fish in different seasons. Values for energy, protein, moisture, and Fulton's condition factor were higher for farmed than for wild fish in the rainy season, indicating better nutritional quality; however, these differences were not observed in the dry season. Likewise, we found significant enhancement of delta(15)N in farmed fish in the rainy season but not in the dry season, whereas enhancement of delta(13)C was observed in both seasons. The combined measurement of delta(13)C and delta(15)N provided traceability under all conditions. Our findings show that stable isotope analysis of C and N can be used to trace cachara origin, and that seasonal variations need to be considered when applying chemical and isotopic authentication of fish and fish products. (C) 2010 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A lo largo de este trabajo se lleva a cabo una investigación sobre la evolución de las relaciones comerciales entre fabricantes y distribuidores, con especial atención en la colaboración conjunta a la hora de comercializar los productos en el punto de venta. El empleo de nuevas herramientas tecnológicas en el establecimiento facilita el merchandising de presentación, ofreciendo ventajas competitivas para los agentes de la cadena de suministros y nuevas experiencias de compra para los consumidores. Una vez analizada la parte teórico-conceptual del trabajo se lleva a cabo el análisis de un caso práctico sobre los beneficios de la tecnología Radio Frequency Identification (RFID) implantada en la empresa Decathlon. Estos sistemas se han convertido en un aliado clave para la mejora de los procesos de negocio, mejorando la gestión de la compañía y la fidelización de los clientes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Esta investigación pretende aproximarse al papel de Change.org como plataforma de petición electrónica en España, donde no existen alternativas administradas por los poderes públicos. Mediante un análisis de contenido cualitativo y una entrevista semi-estructurada, investigamos el modelo de negocio de la página, con el objetivo de conocer su política de protección de datos, su sistema de verificación de los usuarios y, de forma más general, el marco legislativo en el que opera. Los resultados obtenidos muestran al proyecto alejado del derecho de petición español, con un sistema de testeo laxo y que basa sus beneficios en el coste por adquisición.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research investigates the implementation of battery-less RFID sensing platforms inside lossy media, such as, concrete and grout. Both concrete and novel grouts can be used for nuclear plant decommissioning as part of the U.S. Department of Energy’s (DOE’s) cleanup projects. Our research examines the following: (1) material characterization, (2) analytical modeling of transmission and propagation losses inside lossy media, (3) maximum operational range of RFID wireless sensors embedded inside concrete and grout, and (4) best positioning of antennas for achieving longer communication range between RFID antennas and wireless sensors. Our research uses the battery-less Wireless Identification and Sensing Platform (WISP) which can be used to monitor temperature, and humidity inside complex materials. By using a commercial Agilent open-ended coaxial probe (HP8570B), the measurements of the dielectric permittivity of concrete and grout are performed. Subsequently, the measured complex permittivity is used to formulate analytical Debye models. Also, the transmission and propagation losses of a uniform plane wave inside grout are calculated. Our results show that wireless sensors will perform better in concrete than grout. In addition, the maximum axial and radial ranges for WISP are experimentally determined. Our work illustrates the feasibility of battery-less wireless sensors that are embedded inside concrete and grout. Also, our work provides information that can be used to optimize the power management, sampling rate, and antenna design of such sensors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Alzheimer's disease makes great demands on care by assistants, due to the fact that they cannot distract their attention from patients while they are at the same time managing records. For that reason, technologies to complement this process need to be adapted. In this work we present a proposal to adapt identification technologies: Radiofrequency Identification (RFID) and Near Field Communications (NFC), focusing especially on the last one. We fuse both technologies and apply them to an Alzheimer's day center. Patients are tagged with two kinds of labels: 13.56Mhz.Mifare for NFC and UHF for RFID. With the first one we tag the context, which means patients, devices (displays, exercise books, etc) and places. With a simple interaction, which involves touching tags with mobile phones, it is possible to manage the information easily. Moreover, with RFID, we localize each patient by the simple act of their passing by an antenna placed in the doors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La machine à vecteurs de support à une classe est un algorithme non-supervisé qui est capable d’apprendre une fonction de décision à partir de données d’une seule classe pour la détection d’anomalie. Avec les données d’entraînement d’une seule classe, elle peut identifier si une nouvelle donnée est similaire à l’ensemble d’entraînement. Dans ce mémoire, nous nous intéressons à la reconnaissance de forme de dynamique de frappe par la machine à vecteurs de support à une classe, pour l’authentification d’étudiants dans un système d’évaluation sommative à distance à l’Université Laval. Comme chaque étudiant à l’Université Laval possède un identifiant court, unique qu’il utilise pour tout accès sécurisé aux ressources informatiques, nous avons choisi cette chaîne de caractères comme support à la saisie de dynamique de frappe d’utilisateur pour construire notre propre base de données. Après avoir entraîné un modèle pour chaque étudiant avec ses données de dynamique de frappe, on veut pouvoir l’identifier et éventuellement détecter des imposteurs. Trois méthodes pour la classification ont été testées et discutées. Ainsi, nous avons pu constater les faiblesses de chaque méthode dans ce système. L’évaluation des taux de reconnaissance a permis de mettre en évidence leur dépendance au nombre de signatures ainsi qu’au nombre de caractères utilisés pour construire les signatures. Enfin, nous avons montré qu’il existe des corrélations entre le taux de reconnaissance et la dispersion dans les distributions des caractéristiques des signatures de dynamique de frappe.