98 research outputs found

    Web service locating unit in RFID-centric anti-counterfeit system

    Full text link
    Abstract-The problem of piracy has disturbed people's daily life for hundreds of years and has not been relieved until now, though many existing anti-counterfeit solutions have been applied. However, due to the emergences of Radio Frequency IDentification (RFID) technologies, there is a more reliable alternative solution to construct authentication system. On the other hand, there arises another issue of how to simplify the deployment of RFID-centric anti-counterfeit system over the Internet. In this article, we propose an approach, Web Service Locating Unit (WSLU), to achieve this goal to manage numbers of RFID-centric authentication services (relied on web services)

    Facilitating Internet of Things on the Edge

    Get PDF
    The evolution of electronics and wireless technologies has entered a new era, the Internet of Things (IoT). Presently, IoT technologies influence the global market, bringing benefits in many areas, including healthcare, manufacturing, transportation, and entertainment. Modern IoT devices serve as a thin client with data processing performed in a remote computing node, such as a cloud server or a mobile edge compute unit. These computing units own significant resources that allow prompt data processing. The user experience for such an approach relies drastically on the availability and quality of the internet connection. In this case, if the internet connection is unavailable, the resulting operations of IoT applications can be completely disrupted. It is worth noting that emerging IoT applications are even more throughput demanding and latency-sensitive which makes communication networks a practical bottleneck for the service provisioning. This thesis aims to eliminate the limitations of wireless access, via the improvement of connectivity and throughput between the devices on the edge, as well as their network identification, which is fundamentally important for IoT service management. The introduction begins with a discussion on the emerging IoT applications and their demands. Subsequent chapters introduce scenarios of interest, describe the proposed solutions and provide selected performance evaluation results. Specifically, we start with research on the use of degraded memory chips for network identification of IoT devices as an alternative to conventional methods, such as IMEI; these methods are not vulnerable to tampering and cloning. Further, we introduce our contributions for improving connectivity and throughput among IoT devices on the edge in a case where the mobile network infrastructure is limited or totally unavailable. Finally, we conclude the introduction with a summary of the results achieved

    An Empirical Analysis to Control Product Counterfeiting in the Automotive Industry\u27s Supply Chains in Pakistan

    Get PDF
    The counterfeits pose significant health and safety threat to consumers. The quality image of firms is vulnerable to the damage caused by the expanding flow of counterfeit products in today’s global supply chains. The counterfeiting markets are swelling due to globalization and customers’ willingness to buy counterfeits, fueling illicit activities to explode further. Buyers look for the original parts are deceived by the false (deceptive) signals’ communication. The counterfeiting market has become a multi-billion industry but lacks detailed insights into the supply side of counterfeiting (deceptive side). The study aims to investigate and assess the relationship between the anti-counterfeiting strategies and improvement in the firm’s supply performance within the internal and external supply chain quality management context in the auto-parts industry’s supply chains in Pakistan

    Industry 4.0 technologies within the logistics sector: the key role of innovative start-ups

    Get PDF
    The goal of the study is to analyze the 4.0 innovation in the logistics sector. First, it is provided a view of Industry 4.0 technologies, followed by a focus on Logistics 4.0 technologies as theoretical background. Then, through a patent analysis, the study analyzes in details the logistics sector in order to pursue and to demonstrate where is the origin of innovation in the sector

    Smart contract and web dapp for tracing sustainability indicators in the textile and clothing value chain

    Get PDF
    Mestrado em Engenharia Informática na Escola Superior de Tecnologia e Gestão do Instituto Politécnico de Viana do CasteloNa sociedade atual, o têxtil e vestuário é um dos maiores setores de mercado do mundo. O rápido crescimento desta indústria está a ter impactos sem precedentes na sustentabilidade do planeta, respondendo por consequências negativas ambientais, sociais e de saúde. As tendências da fast-fashion, juntamente com a falta de transparência na cadeia de valor têxtil global, somam-se a cenários desfavoráveis para o mundo, à medida que os níveis crescentes de poluição e consumo de recursos dentro da cadeia de valor atingem máximos históricos a cada ano que passa. O ciclo de vida de uma peça de roupa precisa de se adaptar a um modelo económico regenerativo em vez de linear, que acaba no equivalente a um caminhão de lixo de produtos têxteis sendo descartado num aterro sanitário a cada segundo [1]. Não só as indústrias precisam de reformular os seus processos para circularizar as suas cadeias de valor e promover ações sustentáveis, mas também os consumidores precisam de participar do processo de manter os produtos no círculo da cadeia de valor, pois cabe a eles decidir o destino final de um produto vestuário aquando o seu fim da vida útil. Com estas questões em mente, esta dissertação visa desenvolver duas soluções que possam mitigar os problemas a cima mencionados e promover ações sustentáveis rumo a uma economia circular na cadeia de valor do têxtil e vestuário. Uma solução business-to-business baseada em smart contracts do Hyperledger Fabric para gerir a cadeia de valor do têxtil e vestuário com funcionalidade de rastreabilidade foi desenvolvida como prova de conceito para apoiar as reivindicações de sustentabilidade dos participantes na cadeia de valor, da fibra à peça final de vestuário. A actual funcionabilidade de rastreabilidade desenvolvida no smart contract fornece aos operadores da cadeia de valor a capacidade de rastrear um lote até à sua origem, contudo, também limita a escalabilidade devido ao aumento exponencial do tamanho do bloco, especialmente se considerarmos uma cadeia de valor circular. Para os consumidores, foi proposta uma aplicação descentralizada business-to-consumer-to-consumer com elementos de eco-gamificação para promover o envolvimento e motivação do utilizador para a realização de tarefas que contribuam para a adoção de uma economia circular na cadeia de valor do têxtil e vestuário. Após testar a usabilidade da aplicação com o questionário AttrakDiff, concluiu-se que o sistema precisa de focar a sua usabilidade em prol de um produto orientado à tarefa em vez da orientação pessoal atual da aplicação a fim de promover ações que contribuam para a economia circular da cadeia de valor do têxtil e vestuário.In today’s society, Textile and Clothing (T&C) is one of the biggest market sectors world wide.The sheer size and fast growth of this industry is having unprecedented impacts on sustainability, accounting for negative environmental, social and health consequences. The fast-fashion trends along side the lack of transparency in the global T&C value chain add up to unfavorable scenarios for the world as the increas- ing levels of pollution and resource consumption within the value chain reach historic highs with every year that passes. The lifecycle of a clothing item needs to adapt to a regenerative economic model instead of a linear one that ends up in the equivalent of a garbage truck full of textiles being disposed into a landfill every second [1]. Not only do the industries need to revamp their processes to circularize their value chains and promote sustainable actions, but the consumers also need to partake in the process of keeping the products in the value chain loop as it is up to them to make the final decision upon the end-of-life of an item of clothing. With these issues in mind,this dissertation aims to develop two solutions that can mitigate the aforementioned problems and promote sustainable actions towards a circular economy in the T&C value chain. A Proof-of-Concept (PoC) Business-to-Business (B2B) T&C value chainmanagement smart contract solution builton Hyperledger Fabric with traceability features was developed to support the sustainability claims of participants in the value chain, from fiber to garment. The current traceability feature developed into the smart contract provides value chain operators the capabilities to trace a batch back to its origin, however, it also constraints scalability due to the exponential in crease in block size specially if considering a circular value chain. For the consumers, a Business-to-Consumer-to-Consumer (B2C2C) Decentralized Application (DApp) was proposed with eco-gamification elements fo rpromoting the user’s engagement and motivation to complete tasks that contribute for the adoption of a circular economy in the T&C value chain. After testing the consumer DApp’s usability with the AttrakDiff survey, it was concluded that the system needs to focus it susability towards a task-oriented product instead of the current self-oriented results in order to promote actions that contribute to the circular economy of the T&C value chain

    Blockchain and Internet of Things in smart cities and drug supply management: Open issues, opportunities, and future directions

    Get PDF
    Blockchain-based drug supply management (DSM) requires powerful security and privacy procedures for high-level authentication, interoperability, and medical record sharing. Researchers have shown a surprising interest in Internet of Things (IoT)-based smart cities in recent years. By providing a variety of intelligent applications, such as intelligent transportation, industry 4.0, and smart financing, smart cities (SC) can improve the quality of life for their residents. Blockchain technology (BCT) can allow SC to offer a higher standard of security by keeping track of transactions in an immutable, secure, decentralized, and transparent distributed ledger. The goal of this study is to systematically explore the current state of research surrounding cutting-edge technologies, particularly the deployment of BCT and the IoT in DSM and SC. In this study, the defined keywords “blockchain”, “IoT”, drug supply management”, “healthcare”, and “smart cities” as well as their variations were used to conduct a systematic search of all relevant research articles that were collected from several databases such as Science Direct, JStor, Taylor & Francis, Sage, Emerald insight, IEEE, INFORMS, MDPI, ACM, Web of Science, and Google Scholar. The final collection of papers on the use of BCT and IoT in DSM and SC is organized into three categories. The first category contains articles about the development and design of DSM and SC applications that incorporate BCT and IoT, such as new architecture, system designs, frameworks, models, and algorithms. Studies that investigated the use of BCT and IoT in the DSM and SC make up the second category of research. The third category is comprised of review articles regarding the incorporation of BCT and IoT into DSM and SC-based applications. Furthermore, this paper identifies various motives for using BCT and IoT in DSM and SC, as well as open problems and makes recommendations. The current study contributes to the existing body of knowledge by offering a complete review of potential alternatives and finding areas where further research is needed. As a consequence of this, researchers are presented with intriguing potential to further create decentralized DSM and SC apps as a result of a comprehensive discussion of the relevance of BCT and its implementation.© 2023 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).fi=vertaisarvioitu|en=peerReviewed

    Aura recognizing digital information of everyday environment

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2009.Includes bibliographical references (leaves 62-64).Many ubiquitous computing scenarios are enabled by the ability to detect and identify objects in a user's environment, and recently Radio Frequency Identification (RFID) has been considered an affordable technology for providing such ability. However, RFID approaches have been flawed: when they operate at long range, they fail to provide adequate context as to which tagged objects are the subject of the user's interest; and when tuned for short range operation, they require the user to explicitly scan the tagged object. In addition, the knowledge gained from the user interacting with the object is limited to identification. This thesis proposes an ambient metaphor for detecting daily environments suitable for the upcoming far-field UHF RFID infrastructure. A user carries a mobile RFID reader, which creates a sphere of detection field to monitor RFID tags surrounding the user. The reader silently monitors the objects and functions as an agent that supports the user's consciousness of events happening outside of the user's attention. With sensor-enhanced RFID tags, our system does not limit itself to identification, but also provides the status of the corresponding item. The data from the sensors are used to distinguish a tag in a multiple tag environment and to describe the interactions between the user and the host object. This improves the selectivity and the context-awareness of the system.by Sanghoon Lee.S.M

    Technology Acceptance, Acceptabilty and Appropriation in Professionnal Bureaucracies : The Case of RFID for Improving Mobile Assets Management in Hospitals

    Get PDF
    RÉSUMÉ : Les hôpitaux, même ceux de petite taille, peuvent gérer sur une base quotidienne plusieurs milliers d’actifs fixes et mobiles. Les actifs mobiles sont très diversifiés et incluent des pompes à infusion, du matériel chirurgical, des électrocardiogrammes, des machines portables à rayons X, des défibrillateurs, etc. Ces actifs circulent en permanence entre les différents services et les divers départements. Pratiquement tous les patients dépendent d'un ou plusieurs actifs mobiles lors de leur hospitalisation. Ces actifs sont également indispensables à la prestation des soins de santé et le personnel clinique consacre une partie importante de leur temps pour chercher ces actifs lorsque requis. L'incapacité de retrouver ces actifs en cas d’urgence peut mettre la vie des patients en danger. La technologie RFID (Radio Frequency Identification) a le potentiel de retracer et d’effectuer le suivi, et ce, de façon unique et transparente, les actifs mobiles et, par conséquent, d’en améliorer leur gestion dans les hôpitaux. Comparé à d’autres secteurs d’activité, le secteur de la santé adopte RFID à un rythme beaucoup plus lent, ce qui se traduit par un nombre limité d'études empiriques portant sur l’implantation de RFID dans ce secteur. Cette thèse se propose donc de contribuer à ce vide empirique par une analyse en profondeur d’une implantation réelle de RFID. Cette implantation vise à améliorer la gestion d'un type d’actifs mobiles, nommément les pompes à infusion dans un hôpital. Les données empiriques ont été recueillies pendant une période de 25 mois, de la phase de préfaisabilité jusqu’à la phase de post-implantation. Huit organisations (incluant l'hôpital qui est le principal site d'observation) et 35 participants ont été impliqués. Les résultats de la recherche peuvent être résumés comme suit. À la question, pourquoi RFID est implanté? La réduction des inefficacités existantes liées à la gestion des actifs mobiles en est la principale raison. De plus, la familiarité avec les technologies de l’information au sein de l'hôpital, la compatibilité de l’infrastructure existante (l'hôpital est presque 100% Wi-Fi) et l'expérience des partenaires technologiques sont des facteurs positifs reliés à l’implantation RFID. Comment l’implantation RFID est-elle effectuée? Les résultats montrent que le processus d’implantation est fortement itératif : les participants reviennent en effet sur les phases précédentes et modifient les décisions approuvées antérieurement. L'amélioration continue des services de soins est sans aucun doute la préoccupation principale exprimée par tous les participants de l'hôpital. Toutefois, les attentes et les exigences diffèrent entre les différents groupes de participants. Les résultats démontrent un clivage entre les points de vue de l’administration et ceux du côté clinique. Des divergences sont notées entre les infirmières et les médecins, et, entre les techniciens de l'hôpital (responsables des TIC, ingénieurs biomédicaux, et spécialistes de la maintenance) et les administrateurs. Les enjeux les plus importants ne sont pas technologiques, mais sont principalement organisationnels, ce qui semble découler de la présence de points de vue divergents. Est-ce que la RFID améliore la gestion des actifs mobiles? Les résultats suggèrent que les avantages identifiés et évalués lors l’implantation de RFID appartiennent aux catégories suivantes: amélioration de la visibilité des actifs, augmentation de l'efficacité opérationnelle, réduction de certains coûts et émergence de processus intelligents. Ce dernier point apparait comme particulièrement important. Les processus intelligents misent principalement sur les capacités d'auto-identification et de sensibilité au contexte (context-awareness) de RFID, sur le changement automatique de statuts, et sur la mise à jour automatique des applications d’hôpital (par exemple, WMS). Les résultats démontrent également que les processus intelligents améliorent la planification et la prise de décision. Est-ce que les caractéristiques intrinsèques des organisations dans lesquelles la technologie RFID est envisagée posent des contraintes à son implantation? Les hôpitaux, qualifiés de bureaucraties professionnelles, constituent un ensemble unique de contraintes dont on doit tenir compte lors d’une implantation RFID. En particulier, l'inertie, la complexité et la rigidité organisationnelles ne sont pas favorables à des changements à grande échelle dans l’hôpital et affectent la façon dont RFID est implanté. En outre, l'existence d'une structure à double pouvoir et les pièges liés à une culture forte (culture entrapment)ont un impact profond sur l'importance des avantages découlant de RFID. Est-ce que l’acceptation de la technologie, son acceptabilité et son appropriation représentent des concepts clés pour comprendre l’implantation de la RFID? Ces trois concepts ont été explorés lors de cette recherche et ont conduit à deux observations principales. Tout d'abord, on peut affirmer que si la technologie est acceptée, acceptable et appropriée, elle est utilisée, de façon partielle ou plus large. Par extension, l'acceptation, l'acceptabilité et l'appropriation pourraient être importantes non seulement pour expliquer l'ampleur de l'utilisation d'une technologie (utilisation partielle par rapport à la pleine utilisation), mais aussi pour expliquer les raisons pour lesquelles une technologie a été initialement adoptée, puis ensuite rejetée. Deuxièmement, les résultats empiriques ne confirment pas un ordre chronologique entre ces trois concepts. Par exemple, l'appropriation ne suit pas l'acceptation, même au début de l’implantation. Au contraire, l'acceptation, l'acceptabilité et l'appropriation coexistent à tout moment pendant le processus d’implantation. Cependant, l’ordre chronologique joue quand même un rôle puisque les niveaux d'acceptation, l'acceptabilité et l'appropriation varient au fil du temps. En outre, ces trois concepts sont sensibles à la fois à la technologie (dans ce cas, RFID) et au contexte dans lequel cette technologie est utilisée (l'hôpital), qui continuent de leur côté à changer au fil du temps. La thèse se termine en examinant les limites de la recherche, en proposant quelques pistes de recherche. Les contributions de cette thèse peuvent être pertinentes pour les chercheurs, les décideurs du secteur de la santé, les administrateurs d'hôpitaux, et les spécialistes et consultants en TI.----------ABSTRACT : Hospitals, even small ones, handle on a daily basis several thousands of mobile and fixed assets. Mobile assets are very diverse, ranging from infusion pumps, surgical equipment, electrocardiograms, portable x-ray machines, defibrillators to wheelchairs and rotate constantly between different medical wards. Since virtually every patient depends on one or more mobile assets during his or her hospital stay, they are also indispensable in healthcare delivery. Clinical staff spends a significant share of their working time searching for these essential, but commonly misplaced assets. Locating mobile assets is not only a time consuming activity, but the inability to find them when needed is remarkably costly, and possibly life threatening. RFID (Radio Frequency Identification) holds the potential to uniquely and seamlessly track and trace mobile assets and, thus, to improve mobile asset management in hospitals. Compared to other sectors, healthcare organizations adopt RFID at a much slower pace and only a limited number of empirical studies address RFID adoption and implementation in the context of healthcare. This thesis intends to contribute the research arena by analysing a real-life RFID implementation in order improve the management activities of one type of mobile assets, namely infusion pumps in hospital settings. The research focuses on a real-life RFID implementation in one European hospital. Empirical data was collected for a 25 month period from the pre-feasibility stage to post-implementation stage from eight organizations (including the hospital as the main observation site) and from thirty-five participants. Research results can be summarized as follows. To the question why RFID is implemented? The most straightforward answer is to reduce the existing inefficiencies related to mobile assets management. Technological preparedness and readiness drive RFID implementation: This includes familiarity with IT innovations within the hospital, compatibility with existing IT infrastructure (the hospital is almost 100% Wi-Fi enabled), and experience of technological partners with RFID implementation in various sectors. How RFID implementation is carried out? The answer seems to be through a highly iterative five stage process where participants revisited and modified previously agreed steps. The continuous improvement of care services was without a doubt the superseding concern expressed by all participants from the hospital. However, expectations and requirements differ among different groups of participants. The empirical evidence demonstrates not only a cleavage between the administrative and clinical perspectives, but also within the clinical perspective. Divergences run deep within each perspective (for instance, nurses vs. doctors) and between the technologists in the hospital (ICT managers, biomedical engineers, and maintenance specialists) and the administrators. The most significant issues related to such implementation are not technological but are mainly organizational, as they seem to arise from the presence of diverging perspectives. Does RFID really improve mobile assets management? Results suggest that the benefits identified and evaluated during the real life RFID implementation belong to the following broad categories: improving assets visibility, promoting operational efficiency, reducing costs and facilitating the emergence of intelligent processes. Intelligent processes are mainly derived from the RFID capabilities for auto-identification and context-awareness, process automatic status change, and automatic update in hospital’s enterprise applications (i.e. WMS). Results further demonstrate that intelligent processes improve planning and decision-making. Do the intrinsic characteristics of organizations play a role in RFID implementation? The very characteristics of hospitals, qualified as complex professional bureaucracies, constitute a unique set of constraints to be taken into account for RFID implementation. In particular, organizational inertia, complexity and inflexibility are not conductive to hospital-wide changes and affect how RFID is implemented. Moreover, the existence of a dual power structure and a tendency to culture entrapment may have a profound impact on the importance of the benefits derived from RFID. Do technology acceptance, acceptability and appropriation represent key concepts that should be considered to understand the implementation of RFID? These three concepts were explored in the research. This leads to two main observations. First, it could be stated that if technology is accepted, acceptable and appropriated, then it is fully used. By extension, acceptance, acceptability and appropriation could be significant not only in explaining the extent of use of a technology (partial use vs. full use), but also the reasons why a technology was initially adopted and then discarded. Second, empirical results reject the presence of a chronological order between the three concepts. For instance, appropriation does not follow acceptance, even initially. Rather, acceptance, acceptability and appropriation coexist at any time during the implementation process. However, chronology still matters since the levels of acceptance, acceptability and appropriation vary over time. Furthermore, these three concepts are sensitive to both the technology (in this case RFID) and to the context where it is use (the hospital), which are also changing over time. The thesis examines research limitations, proposes some research avenues and outlines contributions that may be relevant for researchers, healthcare policy makers, hospital administrators, IT specialists and IT consultants

    Uniquely Identifiable Tamper-Evident Device Using Coupling between Subwavelength Gratings

    Get PDF
    Reliability and sensitive information protection are critical aspects of integrated circuits. A novel technique using near-field evanescent wave coupling from two subwavelength gratings (SWGs), with the input laser source delivered through an optical fiber is presented for tamper evidence of electronic components. The first grating of the pair of coupled subwavelength gratings (CSWGs) was milled directly on the output facet of the silica fiber using focused ion beam (FIB) etching. The second grating was patterned using e-beam lithography and etched into a glass substrate using reactive ion etching (RIE). The slightest intrusion attempt would separate the CSWGs and eliminate near-field coupling between the gratings. Tampering, therefore, would become evident. Computer simulations guided the design for optimal operation of the security solution. The physical dimensions of the SWGs, i.e. period and thickness, were optimized, for a 650 nm illuminating wavelength. The optimal dimensions resulted in a 560 nm grating period for the first grating etched in the silica optical fiber and 420 nm for the second grating etched in borosilicate glass. The incident light beam had a half-width at half-maximum (HWHM) of at least 7 µm to allow discernible higher transmission orders, and a HWHM of 28 µm for minimum noise. The minimum number of individual grating lines present on the optical fiber facet was identified as 15 lines. Grating rotation due to the cylindrical geometry of the fiber resulted in a rotation of the far-field pattern, corresponding to the rotation angle of moiré fringes. With the goal of later adding authentication to tamper evidence, the concept of CSWGs signature was also modeled by introducing random and planned variations in the glass grating. The fiber was placed on a stage supported by a nanomanipulator, which permitted three-dimensional displacement while maintaining the fiber tip normal to the surface of the glass substrate. A 650 nm diode laser was fixed to a translation mount that transmitted the light source through the optical fiber, and the output intensity was measured using a silicon photodiode. The evanescent wave coupling output results for the CSWGs were measured and compared to the simulation results
    corecore