13,533 research outputs found

    A Privacy Preserving Framework for RFID Based Healthcare Systems

    Get PDF
    RFID (Radio Frequency IDentification) is anticipated to be a core technology that will be used in many practical applications of our life in near future. It has received considerable attention within the healthcare for almost a decade now. The technology’s promise to efficiently track hospital supplies, medical equipment, medications and patients is an attractive proposition to the healthcare industry. However, the prospect of wide spread use of RFID tags in the healthcare area has also triggered discussions regarding privacy, particularly because RFID data in transit may easily be intercepted and can be send to track its user (owner). In a nutshell, this technology has not really seen its true potential in healthcare industry since privacy concerns raised by the tag bearers are not properly addressed by existing identification techniques. There are two major types of privacy preservation techniques that are required in an RFID based healthcare system—(1) a privacy preserving authentication protocol is required while sensing RFID tags for different identification and monitoring purposes, and (2) a privacy preserving access control mechanism is required to restrict unauthorized access of private information while providing healthcare services using the tag ID. In this paper, we propose a framework (PriSens-HSAC) that makes an effort to address the above mentioned two privacy issues. To the best of our knowledge, it is the first framework to provide increased privacy in RFID based healthcare systems, using RFID authentication along with access control technique

    Simulation of undular bores evolution with damping

    Get PDF
    Propagation of undular bores with damping is considered in the framework of perturbed extended Korteweg-de Vries (peKdV) equation. Two types of damping terms for the peKdV equation, namely linear and Chezy frictional terms, which describe the turbulent boundary layers in the ïŹ‚uid ïŹ‚ow are considered. Solving the peKdV equation numerically using the method of lines shows that under the inïŹ‚uence of damping, the lead-ing solitary wave of the undular bores will split from the nonlinear wavetrain, propagates and behaves like an isolated solitary wave. The amplitude of the leading wave will remain the same for some times before it starts to decay again at a larger time. In general the amplitude of the leading wave and the mean level across the undular bore decreases due to the eïŹ€ect of damping

    Theme Park Routing: A Decision Support System for Walt Disney World Trips

    Get PDF
    With over 52 million visitors annually, the Walt Disney World theme park is one of the busiest places on earth (US City Traveler, 2015). While some of these visitors are regular attendees, most are creating new memories in unfamiliar territory. To assist these novice theme park visitors, a plethora of reference books, blogs, tour guides and other resources exist. These recommend which attractions to visit and their popularity. What these resources do not provide, however, is the optimal order that these attractions should be visited

    Technologie RFID a Blochkchain v dodavatelskĂ©m ƙetězci

    Get PDF
    The paper discusses the possibility of combining RFID and Blockchain technology to more effectively prevent counterfeiting of products or raw materials, and to solve problems related to production, logistics and storage. Linking these technologies can lead to better planning by increasing the transparency and traceability of industrial or logistical processes or such as efficient detection of critical chain sites.Pƙíspěvek se zabĂœvĂĄ moĆŸnostĂ­ kombinace technologiĂ­ RFID a Blockchain pro ĂșčinnějĆĄĂ­ zabrĂĄněnĂ­ padělĂĄnĂ­ vĂœrobkĆŻ či surovin a ƙeĆĄenĂ­ problĂ©mĆŻ spojenĂœch s vĂœrobou, logistikou a skladovĂĄnĂ­m. SpojenĂ­ těchto technologiĂ­ mĆŻĆŸe vĂ©st k lepĆĄĂ­mu plĂĄnovĂĄnĂ­ dĂ­ky vyĆĄĆĄĂ­ transparentnosti a sledovatelnosti prĆŻmyslovĂœch nebo logistickĂœch procesĆŻ, nebo napƙíklad k efektivnĂ­mu zjiĆĄĆ„ovĂĄnĂ­ kritickĂœch mĂ­st ƙetězce

    An Exploratory Study of RFID Implementation in the Supply Chain

    Get PDF
    The purpose of this paper is to investigate the barriers and motivations for adopting radio frequency identification (RFID), the level of RFID implementation, the processes RFID is utilized in, and issues in the deployment of RFID. A survey instrument was developed based on a literature review. The survey was then distributed to the members of the Association for Operations Management Rhode Island and Boston chapters. The results were then analyzed. It was found that the majority of the surveyed firms are not considering RFID implementation. Lack of a business case and lack of understanding were cited as their main concerns. For firms considering RFID implementation and firms that had implemented RFID, better inventory management, obtaining competitive advantage, and cost reduction were the three most important motivations for adopting RFID. Financial concerns and the lack of a business case were the most prevalent issues. In addition, product tracking (pallets, cases, and items) in shipping was the most cited RFID application. It was also found that considering firms are facing less pressure from customers to adopt RFID and reported a much higher degree of apprehension regarding potential issues than implementing firms reported for actual difficulties faced. One of the limitations is the small sample size (n = 49) which may limit the generalizability of the results. By identifying barriers, motivations, and issues in the implementation of RFID, this study further educates practitioners on the challenges and opportunities of RFID, as well as providing direction to academicians for further research on this area
    • 

    corecore