9,035 research outputs found

    RFID chips: Future technology on everyone’s lips

    Get PDF
    Radio frequency identification (RFID) is considered a technology of the future, but RFID chips have long established themselves in our everyday lives. RFID systems combine the physical world of a product with the virtual world of digital data. Projects based on RFID far transcend simply replacing the bar code, and in fact represent a new all-encompassing structural concept. The RFID market is faced with the conflicting demands for cheap solutions on the one hand and guaranteed high-level security, which is predicated on additional investment, on the other. The retail trade is playing a decisive part in the broad-based roll-out of RFID projects. Beyond deployment in the retail market, though, RFID will soon be considered an indispensable part of the entire value chain in all sectors of the economy.information- and communication technology; ICT; e-business; e-commerce; B2C-e-commerce; internet; retail; supply chain management; tag

    Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT

    Get PDF
    The designers of Radio-Frequency IDentification (RFID) systems have a challenging task for proposing secure mutual authentication protocols for Internet of Things (IoT) applications. Recently, Fan et al. proposed a new lightweight RFID mutual authentication protocol in the journal of IEEE Transactions on Industrial Informatics. They claimed that their protocol meets necessary security properties for RFID systems and can be applied for IoT. In this paper, we analyze the security of this protocol and show that it is vulnerable against secret disclosure, reader impersonation and tag traceability attacks. Additionally, we show that in their protocol the anonymity of the tag does not held

    RFID TECHNNOLOGY - NEW CHALLENGE FOR MANUFACTURING AND LOGISTICS CENTERS

    Get PDF
    RFID technology can be exploited in newly developed logistics centers in Polandas well. The Radio frequency identification (RFID) has been recognized as one of the greatesttechnologies implemented by enterprises in different branches. Constantly increasing numberof enterprises, which are making use of RFID technology to improve their efficiency ofmanufacturing goods, functioning as well as to achieve a competitive advantage on themarket, shows the great necessity of large changes. One of the fields where RFID can be usedis logistics centers. There are projects that implement RFID into logistics centers. Suchprojects start with a study of what kinds of needs are in the market, and proceeds to thedevelopment of concept as well as project determines what the new systems and hardwarerequirements will be to translate the concept of logistics centers with RFID systems to anactual infrastructure. Conclusion is that RFID will be more universally diffused andassimilated into everyday life in the future.RFID, logistics centre, project

    The strategic importance of supply chains and the RFID radio data identification system

    Get PDF
    Purpose: The paper presents the issues related to the process of supply chain management. It presents the essence and classification of supply chains and the interpretation of global supply network management. Design/Methodology/Approach: Using systems theory as a basis, a RFID utilization and outcome(s) performance model was developed from the literature. The study uses surveys conducted among twenty companies in the 2016-2017 research year. Enterprises that use RFID technologies in the supply chain were analyzed. Findings: The Findings indicate that application of RFID technology leads to improved manufacturing efficiency and manufacturing effectiveness, while improvement in efficiency lead directly to improved organizational performance, and improvements in effectiveness lead directly to improved supply chain performance. Practical Implications: Certain policy implications and obligations accrue are companies that use RFID technology in their supply order to manage the company more efficiently. Originality/Value: The publication presents the results of research carried out in enterprises using the new RFID system as a modern technique of supporting supply chain management to increase the efficiency of cooperation throughout the entire supply chain.peer-reviewe

    Quality control and product tracing in ERP systems

    Get PDF
    Food safety and quality are keys to companies' business survival and great efforts and resources are devoted to them. This is an on-going challenge, demanding the best control systems and day- to-day vigilance on farms, in processing plants and throughout the distribution system. The product quality of the Hungarian meet industry meets the high level international standards, because the Hungarian meet industry is an export oriented sector. However, the application of computers and information systems still haven’t got enough emphasis in the food sector, although the majority of companies use ERP systems. IT budgets of Hungarian companies are smaller than of the ones in industrialized countries. They spend 0.49% of their return from sales on IT operation and development. We find different rates among Hungarian owners and foreign owners. The Hungarian ones spend less (0.36%), but foreigners spend twice this amount (0.61) on informatics. Quality control is conducted at several stages of the production flow. The most important targets are basic materials coming from partners, purchased and processed products and foods. We have to be able to identify and determine what ingredients there are in the end-products and what the production and distribution processes were. Sometimes this refers to a process backwards that we have to conduct when we discover a mistake in the production flow or in the quality of the end-product. Back- tracing is a six stage flow in the system. Our paper and lecture describes how the ERP system is built-in food tracing functions and experiences in Hungary

    The Switched Local Area Networks’ Delay Problem: Issues and a Deterministic Solution Approach

    Get PDF
    A large number of installed local area networks are sluggish in terms of speed of uploading and down- loading of information. Researchers have, therefore, proposed the need for such networks to be designed with specified maximum end-to-end delay. This is because, if the maximum packet delay between any two nodes of a network is not known, it is impossible to provide a deterministic guarantee of worst case response times of packets’ flows. Therefore, the need for analytic and formal basis for designing such networks becomes very imperative. In this regard, this chapter has discussed the switched local area networks’ delay problem and related issues. It compared the two principal approaches for determining the end-to-end response times of flows in communication networks – stochastic approach and determin- istic approach. The chapter goes on to demonstrate the superiority of the latter approach by using it to develop and validate the goodness of a general maximum delay packet switch model

    The Internet-of-Things Meets Business Process Management: Mutual Benefits and Challenges

    Get PDF
    The Internet of Things (IoT) refers to a network of connected devices collecting and exchanging data over the Internet. These things can be artificial or natural, and interact as autonomous agents forming a complex system. In turn, Business Process Management (BPM) was established to analyze, discover, design, implement, execute, monitor and evolve collaborative business processes within and across organizations. While the IoT and BPM have been regarded as separate topics in research and practice, we strongly believe that the management of IoT applications will strongly benefit from BPM concepts, methods and technologies on the one hand; on the other one, the IoT poses challenges that will require enhancements and extensions of the current state-of-the-art in the BPM field. In this paper, we question to what extent these two paradigms can be combined and we discuss the emerging challenges

    Shopping For Privacy: How Technology in Brick-and-Mortar Retail Stores Poses Privacy Risks for Shoppers

    Get PDF
    As technology continues to rapidly advance, the American legal system has failed to protect individual shoppers from the technology implemented into retail stores, which poses significant privacy risks but does not violate the law. In particular, I examine the technologies implemented into many brick-and-mortar stores today, many of which the average everyday shopper has no idea exists. This Article criticizes these technologies, suggesting that many, if not all of them, are questionable in their legality taking advantage of their status in a legal gray zone. Because the American judicial system cannot adequately protect the individual shopper from these questionable privacy practices, I call upon the Federal Trade Commission, the de facto privacy regulator in the United States, to increase its policing of physical retail stores to protect the shopper from any further harm

    Proximal business intelligence on the semantic web

    Get PDF
    This is the post-print version of this article. The official version can be accessed from the link below - Copyright @ 2010 Springer.Ubiquitous information systems (UBIS) extend current Information System thinking to explicitly differentiate technology between devices and software components with relation to people and process. Adapting business data and management information to support specific user actions in context is an ongoing topic of research. Approaches typically focus on providing mechanisms to improve specific information access and transcoding but not on how the information can be accessed in a mobile, dynamic and ad-hoc manner. Although web ontology has been used to facilitate the loading of data warehouses, less research has been carried out on ontology based mobile reporting. This paper explores how business data can be modeled and accessed using the web ontology language and then re-used to provide the invisibility of pervasive access; uncovering more effective architectural models for adaptive information system strategies of this type. This exploratory work is guided in part by a vision of business intelligence that is highly distributed, mobile and fluid, adapting to sensory understanding of the underlying environment in which it operates. A proof-of concept mobile and ambient data access architecture is developed in order to further test the viability of such an approach. The paper concludes with an ontology engineering framework for systems of this type – named UBIS-ONTO
    • …
    corecore