2,636 research outputs found

    Simulation of undular bores evolution with damping

    Get PDF
    Propagation of undular bores with damping is considered in the framework of perturbed extended Korteweg-de Vries (peKdV) equation. Two types of damping terms for the peKdV equation, namely linear and Chezy frictional terms, which describe the turbulent boundary layers in the fluid flow are considered. Solving the peKdV equation numerically using the method of lines shows that under the influence of damping, the lead-ing solitary wave of the undular bores will split from the nonlinear wavetrain, propagates and behaves like an isolated solitary wave. The amplitude of the leading wave will remain the same for some times before it starts to decay again at a larger time. In general the amplitude of the leading wave and the mean level across the undular bore decreases due to the effect of damping

    RFID TECHNNOLOGY - NEW CHALLENGE FOR MANUFACTURING AND LOGISTICS CENTERS

    Get PDF
    RFID technology can be exploited in newly developed logistics centers in Polandas well. The Radio frequency identification (RFID) has been recognized as one of the greatesttechnologies implemented by enterprises in different branches. Constantly increasing numberof enterprises, which are making use of RFID technology to improve their efficiency ofmanufacturing goods, functioning as well as to achieve a competitive advantage on themarket, shows the great necessity of large changes. One of the fields where RFID can be usedis logistics centers. There are projects that implement RFID into logistics centers. Suchprojects start with a study of what kinds of needs are in the market, and proceeds to thedevelopment of concept as well as project determines what the new systems and hardwarerequirements will be to translate the concept of logistics centers with RFID systems to anactual infrastructure. Conclusion is that RFID will be more universally diffused andassimilated into everyday life in the future.RFID, logistics centre, project

    RFID Demystified: Part 3. Company Case Studies.

    Get PDF
    In the previous two parts of RFID Demystified we have discussed the technology, possible benefits and areas of application for with Radio Frequency Identification (RFID) systems. In this final part we review Company Case-Studies of those who have decided to apply the technology within their organisation. It will be seen that considerable benefits are being experienced within some organisations, pilot applications are increasing our learning and providing a foundation for the future success of projects in this area

    Agent and cyber-physical system based self-organizing and self-adaptive intelligent shopfloor

    Get PDF
    The increasing demand of customized production results in huge challenges to the traditional manufacturing systems. In order to allocate resources timely according to the production requirements and to reduce disturbances, a framework for the future intelligent shopfloor is proposed in this paper. The framework consists of three primary models, namely the model of smart machine agent, the self-organizing model, and the self-adaptive model. A cyber-physical system for manufacturing shopfloor based on the multiagent technology is developed to realize the above-mentioned function models. Gray relational analysis and the hierarchy conflict resolution methods were applied to achieve the self-organizing and self-adaptive capabilities, thereby improving the reconfigurability and responsiveness of the shopfloor. A prototype system is developed, which has the adequate flexibility and robustness to configure resources and to deal with disturbances effectively. This research provides a feasible method for designing an autonomous factory with exception-handling capabilities

    Architectural Patterns for RFID Applications in Manufacturing

    Get PDF
    When applying RFID in production, it needs to be integrated into the used IT systems. However, till today system designers cannot rely on a standard solution for integrating RFID technology in manufacturing software systems. Each manufacturer has to deal with the same challenges: No consolidated findings on how to integrate RFID into the IT infrastructure exist. The consequence is that each IT department has to develop a solution from scratch. In order to give well-founded design guidelines for embedding RFID into the company’s IT infrastructure, we conducted seven in-depth case studies of the state-of-the-art in manufacturing IT infrastructures. Our findings allowed us to specify architectural patterns for common RFID applications in manufacturing. With our work we support system designers in choosing the appropriate architecture for different RFID applications and design goals. We present our solutions in form of architectural patterns that enable manufacturing IT systems to benefit from RFID

    A robust digital image watermarking using repetition codes against common attacks

    Get PDF
    Digital watermarking is hiding the information inside a digital media to protect for such documents against malicious intentions to change such documents or even claim the rights of such documents. Currently the capability of repetition codes on various attacks in not sufficiently studied. In this project, a robust frequency domain watermarking scheme has been implemented using Discrete Cosine Transform (DCT). The idea of this scheme is to embed an encoded watermark using repetition code (3, 1) inside the cover image pixels based on Discrete Cosine Transform (DCT) embedding technique. The proposed methods have undergone several simulation attacks tests in order to check up and compare their robustness against various attacks, like salt and pepper, speckle, compress, Gaussian, image contrast, resizing and cropping attack. The robustness of the watermarking scheme has been calculated using Peak Signal-To-Noise Ratio (PSNR), Mean Squared Error (MSE) and Normalized Correlations (NC). In our experiments, the results show that the robustness of a watermark with repetition codes is much better than without repetition code

    Multi-State Logging Freeze Detection Passive RFID Tags

    Get PDF
    In this work the design and measurement of a passive UHF RFID smart tag suitable for monitoring and recording critical temperature violations in cold chain management are presented. The tag uses moving parts to detect and log different temperate states without the requirement for transceivers, memory and batteries. A simple mechanical method is proposed whereby a moving metallic plate is trapped in one of 4 possible positions by specific environmental temperatures whereby inducing a permanent state based change in the passive RFID tag response. The latched product critical temperature violations can be monitored via the read power required to turn on the tag transponder chip which differs in each state

    An Approach to Near Field Data Selection in Radio Frequency Identification

    Get PDF
    Personal identification is needed in many civil activities, and the common identification cards, such as a driver\u27s license, have become the standard document de facto. Radio frequency identification has complicated this matter. Unlike their printed predecessors, contemporary RFID cards lack a practical way for users to control access to their individual fields of data. This leaves them more available to unauthorized parties, and more prone to abuse. Here, then was undertaken a means to test a novel RFID card technology that allows overlays to be used for reliable, reversible data access settings. Similar to other proposed switching mechanisms, it offers advantages that may greatly improve outcomes. RFID use is increasing in identity documents such as drivers\u27 licenses and passports, and with it concern over the theft of personal information, which can enable unauthorized tracking or fraud. Effort put into designing a strong foundation technology now may allow for widespread development on them later
    • …
    corecore