9,035 research outputs found
RFID chips: Future technology on everyone’s lips
Radio frequency identification (RFID) is considered a technology of the future, but RFID chips have long established themselves in our everyday lives. RFID systems combine the physical world of a product with the virtual world of digital data. Projects based on RFID far transcend simply replacing the bar code, and in fact represent a new all-encompassing structural concept. The RFID market is faced with the conflicting demands for cheap solutions on the one hand and guaranteed high-level security, which is predicated on additional investment, on the other. The retail trade is playing a decisive part in the broad-based roll-out of RFID projects. Beyond deployment in the retail market, though, RFID will soon be considered an indispensable part of the entire value chain in all sectors of the economy.information- and communication technology; ICT; e-business; e-commerce; B2C-e-commerce; internet; retail; supply chain management; tag
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT
The designers of Radio-Frequency IDentification (RFID) systems have a challenging task for proposing secure mutual authentication protocols for Internet of Things (IoT) applications. Recently, Fan et al. proposed a new lightweight RFID mutual authentication protocol in the journal of IEEE Transactions on Industrial Informatics. They claimed that their protocol meets necessary security properties for RFID systems and can be applied for IoT. In this paper, we analyze
the security of this protocol and show that it is vulnerable against secret disclosure, reader impersonation and tag traceability attacks. Additionally, we show that in their protocol the anonymity of the tag does not held
RFID TECHNNOLOGY - NEW CHALLENGE FOR MANUFACTURING AND LOGISTICS CENTERS
RFID technology can be exploited in newly developed logistics centers in Polandas well. The Radio frequency identification (RFID) has been recognized as one of the greatesttechnologies implemented by enterprises in different branches. Constantly increasing numberof enterprises, which are making use of RFID technology to improve their efficiency ofmanufacturing goods, functioning as well as to achieve a competitive advantage on themarket, shows the great necessity of large changes. One of the fields where RFID can be usedis logistics centers. There are projects that implement RFID into logistics centers. Suchprojects start with a study of what kinds of needs are in the market, and proceeds to thedevelopment of concept as well as project determines what the new systems and hardwarerequirements will be to translate the concept of logistics centers with RFID systems to anactual infrastructure. Conclusion is that RFID will be more universally diffused andassimilated into everyday life in the future.RFID, logistics centre, project
The strategic importance of supply chains and the RFID radio data identification system
Purpose: The paper presents the issues related to the process of supply chain management. It presents the essence and classification of supply chains and the interpretation of global supply network management. Design/Methodology/Approach: Using systems theory as a basis, a RFID utilization and outcome(s) performance model was developed from the literature. The study uses surveys conducted among twenty companies in the 2016-2017 research year. Enterprises that use RFID technologies in the supply chain were analyzed.
Findings: The Findings indicate that application of RFID technology leads to improved manufacturing efficiency and manufacturing effectiveness, while improvement in efficiency lead directly to improved organizational performance, and improvements in effectiveness lead directly to improved supply chain performance. Practical Implications: Certain policy implications and obligations accrue are companies that use RFID technology in their supply order to manage the company more efficiently. Originality/Value: The publication presents the results of research carried out in enterprises using the new RFID system as a modern technique of supporting supply chain management to increase the efficiency of cooperation throughout the entire supply chain.peer-reviewe
Quality control and product tracing in ERP systems
Food safety and quality are keys to companies' business survival and great efforts and
resources are devoted to them. This is an on-going challenge, demanding the best control systems and day-
to-day vigilance on farms, in processing plants and throughout the distribution system. The product quality
of the Hungarian meet industry meets the high level international standards, because the Hungarian meet
industry is an export oriented sector. However, the application of computers and information systems still
haven’t got enough emphasis in the food sector, although the majority of companies use ERP systems. IT
budgets of Hungarian companies are smaller than of the ones in industrialized countries. They spend 0.49%
of their return from sales on IT operation and development. We find different rates among Hungarian
owners and foreign owners. The Hungarian ones spend less (0.36%), but foreigners spend twice this amount
(0.61) on informatics. Quality control is conducted at several stages of the production flow. The most
important targets are basic materials coming from partners, purchased and processed products and foods.
We have to be able to identify and determine what ingredients there are in the end-products and what the
production and distribution processes were. Sometimes this refers to a process backwards that we have to
conduct when we discover a mistake in the production flow or in the quality of the end-product. Back-
tracing is a six stage flow in the system. Our paper and lecture describes how the ERP system is built-in
food tracing functions and experiences in Hungary
The Switched Local Area Networks’ Delay Problem: Issues and a Deterministic Solution Approach
A large number of installed local area networks are sluggish in terms of speed of uploading and down-
loading of information. Researchers have, therefore, proposed the need for such networks to be designed
with specified maximum end-to-end delay. This is because, if the maximum packet delay between any
two nodes of a network is not known, it is impossible to provide a deterministic guarantee of worst case
response times of packets’ flows. Therefore, the need for analytic and formal basis for designing such
networks becomes very imperative. In this regard, this chapter has discussed the switched local area
networks’ delay problem and related issues. It compared the two principal approaches for determining
the end-to-end response times of flows in communication networks – stochastic approach and determin-
istic approach. The chapter goes on to demonstrate the superiority of the latter approach by using it to
develop and validate the goodness of a general maximum delay packet switch model
The Internet-of-Things Meets Business Process Management: Mutual Benefits and Challenges
The Internet of Things (IoT) refers to a network of connected devices
collecting and exchanging data over the Internet. These things can be
artificial or natural, and interact as autonomous agents forming a complex
system. In turn, Business Process Management (BPM) was established to analyze,
discover, design, implement, execute, monitor and evolve collaborative business
processes within and across organizations. While the IoT and BPM have been
regarded as separate topics in research and practice, we strongly believe that
the management of IoT applications will strongly benefit from BPM concepts,
methods and technologies on the one hand; on the other one, the IoT poses
challenges that will require enhancements and extensions of the current
state-of-the-art in the BPM field. In this paper, we question to what extent
these two paradigms can be combined and we discuss the emerging challenges
Shopping For Privacy: How Technology in Brick-and-Mortar Retail Stores Poses Privacy Risks for Shoppers
As technology continues to rapidly advance, the American legal system has failed to protect individual shoppers from the technology implemented into retail stores, which poses significant privacy risks but does not violate the law. In particular, I examine the technologies implemented into many brick-and-mortar stores today, many of which the average everyday shopper has no idea exists. This Article criticizes these technologies, suggesting that many, if not all of them, are questionable in their legality taking advantage of their status in a legal gray zone. Because the American judicial system cannot adequately protect the individual shopper from these questionable privacy practices, I call upon the Federal Trade Commission, the de facto privacy regulator in the United States, to increase its policing of physical retail stores to protect the shopper from any further harm
Proximal business intelligence on the semantic web
This is the post-print version of this article. The official version can be accessed from the link below - Copyright @ 2010 Springer.Ubiquitous information systems (UBIS) extend current Information System thinking to explicitly differentiate technology between devices and software components with relation to people and process. Adapting business data and management information to support specific user actions in context is an ongoing topic of research. Approaches typically focus on providing mechanisms to
improve specific information access and transcoding but not on how the information
can be accessed in a mobile, dynamic and ad-hoc manner. Although web ontology has been used to facilitate the loading of data warehouses, less research has been carried out on ontology based mobile reporting. This paper explores how business data can be modeled and accessed using the web ontology
language and then re-used to provide the invisibility of pervasive access; uncovering
more effective architectural models for adaptive information system strategies of this type. This exploratory work is guided in part by a vision of business intelligence that is highly distributed, mobile and fluid, adapting to sensory understanding of the underlying environment in which it operates. A proof-of concept mobile and ambient data access architecture is developed in order to further test the viability of such an approach. The paper concludes with an ontology engineering framework for systems of this type – named UBIS-ONTO
- …