Search results for: technology identification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10373

Search results for: technology identification

10373 Green Sustainability Using Radio Frequency Identification: Technology-Organization-Environment Perspective Using Two Case Studies

Authors: Rebecca Angeles

Abstract:

This qualitative case study seeks to understand and explain the deployment of radio frequency identification (RFID) systems in two countries (i.e. in Taiwan for the adoption of electric scooters and in Finland for supporting glass bottle recycling) using the 'Technology-Organization-Environment' theoretical framework. This study also seeks to highlight the relevance and importance of pursuing environmental sustainability in firms and in society in general due to the social urgency of the issues involved.

Keywords: environmental sustainability, radio frequency identification, technology-organization-environment framework, RFID system implementation, case study, content analysis

Procedia PDF Downloads 444
10372 Smart Unmanned Parking System Based on Radio Frequency Identification Technology

Authors: Yu Qin

Abstract:

In order to tackle the ever-growing problem of the lack of parking space, this paper presents the design and implementation of a smart unmanned parking system that is based on RFID (radio frequency identification) technology and Wireless communication technology. This system uses RFID technology to achieve the identification function (transmitted by 2.4 G wireless module) and is equipped with an STM32L053 micro controller as the main control chip of the smart vehicle. This chip can accomplish automatic parking (in/out), charging and other functions. On this basis, it can also help users easily query the information that is stored in the database through the Internet. Experimental tests have shown that the system has the features of low power consumption and stable operation, among others. It can effectively improve the level of automation control of the parking lot management system and has enormous application prospects.

Keywords: RFID, embedded system, unmanned, parking management

Procedia PDF Downloads 333
10371 Concept for Determining the Focus of Technology Monitoring Activities

Authors: Guenther Schuh, Christina Koenig, Nico Schoen, Markus Wellensiek

Abstract:

Identification and selection of appropriate product and manufacturing technologies are key factors for competitiveness and market success of technology-based companies. Therefore many companies perform technology intelligence (TI) activities to ensure the identification of evolving technologies at the right time. Technology monitoring is one of the three base activities of TI, besides scanning and scouting. As the technological progress is accelerating, more and more technologies are being developed. Against the background of limited resources it is therefore necessary to focus TI activities. In this paper, we propose a concept for defining appropriate search fields for technology monitoring. This limitation of search space leads to more concentrated monitoring activities. The concept will be introduced and demonstrated through an anonymized case study conducted within an industry project at the Fraunhofer Institute for Production Technology. The described concept provides a customized monitoring approach, which is suitable for use in technology-oriented companies especially those that have not yet defined an explicit technology strategy. It is shown in this paper that the definition of search fields and search tasks are suitable methods to define topics of interest and thus to direct monitoring activities. Current as well as planned product, production and material technologies as well as existing skills, capabilities and resources form the basis of the described derivation of relevant search areas. To further improve the concept of technology monitoring the proposed concept should be extended during future research e.g. by the definition of relevant monitoring parameters.

Keywords: monitoring radar, search field, technology intelligence, technology monitoring

Procedia PDF Downloads 474
10370 Radio Frequency Identification Chips in Colour Preference Tracking

Authors: A. Ballard

Abstract:

The ability to track goods and products en route in the delivery system, in the warehouse, and on the top floor is a huge advantage to shippers and retailers. Recently the emergence of radio frequency identification (RFID) technology has enabled this better than ever before. However, a significant problem exists in that RFID technology depends on the quality of the information stored for each tagged product. Because of the profusion of names for colours, it is very difficult to ascertain that stored values are recognised by all users who view the product visually. This paper reports the findings of a study in which 50 consumers and 50 logistics workers were shown colour swatches and asked to choose the name of the colour from a multiple choice list. They were then asked to match consumer products, including toasters, jumpers, and toothbrushes, with the identifying inventory information available for each one. The findings show that the ability to match colours was significantly stronger with the color swatches than with the consumer products and that while logistics professionals made more frequent correct identification than the consumers, their results were still unsatisfactorily low. Based on these findings, a proposed universal model of colour identification numbers has been developed.

Keywords: consumer preferences, supply chain logistics, radio frequency identification, RFID, colour preference

Procedia PDF Downloads 120
10369 Radio Frequency Identification System and Its Effect on Retailing Sector

Authors: Ayşe Çoban, Orhan Çoban, Murat Birekul

Abstract:

In this study, the effects of radio frequency identification system on the retailing sector were theoretically analysed. The technology of Radio Frequency Identification (RFID) is a method enabling to identify the objects individually and automatically, using radio frequency. RFID generally consists of a tag and reader. RFID tags can be programmed to receive, store, and send the information of object such as Electronic Product Code (EPC). Having read the tags placed on product by the reader, the information associated with the management of supply chain can be automatically recorded and replaced. Recently, RFID technology used in many areas has particularly important effects on the businesses that are active in the retailing sector. The most important disadvantage of this technology is that the cost of installation and operation is higher compared to its alternatives. However, it provides important advantages to the business enterprises in the application process. At present, it is especially adopted by the large sized enterprises and with chain stores in the international areas. The application results point out that RFID technology provides business enterprises with the important competitive advantage.

Keywords: RFID, retailing sector, RFID technologies, electronic product code

Procedia PDF Downloads 386
10368 A Supply Chain Traceability Improvement Using RFID

Authors: Yaser Miaji, Mohammad Sabbagh

Abstract:

Radio Frequency Identification (RFID) is a technology which shares a similar concept with bar code. With RFID, the electromagnetic or electrostatic coupling in the RF portion of the electromagnetic spectrum is used to transmit signals. Supply chain management is aimed to keep going long-term performance of individual companies and the overall supply chain by maximizing customer satisfaction with minimum costs. One of the major issues in the supply chain management is product loss or shrinkage. In order to overcome this problem, this system which uses Radio Frequency Identification (RFID) technology will be able to RFID track and identify where losses are occurring and enable effective traceability. RFID brings a new dimension to supply chain management by providing a more efficient way of being able to identify and track items at the various stages throughout the supply chain. This system has been developed and tested to prove that RFID technology can be used to improve traceability in supply chain at low cost. Due to its simplicity in interface program and database management system using Visual Basic and MS Excel or MS Access the system can be more affordable and implemented even by small and medium scale industries.

Keywords: supply chain, RFID, tractability, radio frequency identification

Procedia PDF Downloads 487
10367 Influence of Radio Frequency Identification Technology at Cost of Supply Chain as a Driver for the Generation of Competitive Advantage

Authors: Mona Baniahmadi, Saied Haghanifar

Abstract:

Radio Frequency Identification (RFID) is regarded as a promising technology for the optimization of supply chain processes since it improves manufacturing and retail operations from forecasting demand for planning, managing inventory, and distribution. This study precisely aims at learning to know the RFID technology and at explaining how it can concretely be used for supply chain management and how it can help improving it in the case of Hejrat Company which is located in Iran and works on the distribution of medical drugs and cosmetics. This study uses some statistical analysis to calculate the expected benefits of an integrated RFID system on supply chain obtained through competitive advantages increases with decreasing cost factor. The study investigates how the cost of storage process, labor cost, the cost of missing goods, inventory management optimization, on-time delivery, order cost, lost sales and supply process optimization affect the performance of the integrated RFID supply chain regarding cost factors and provides a competitive advantage.

Keywords: cost, competitive advantage, radio frequency identification, supply chain

Procedia PDF Downloads 276
10366 Focusing of Technology Monitoring Activities Using Indicators

Authors: Günther Schuh, Christina König, Toni Drescher

Abstract:

One of the key factors for the competitiveness and market success of technology-driven companies is the timely provision of information about emerging technologies, changes in existing technologies, as well as relevant related changes in the market's structures and participants. Therefore, many companies conduct technology intelligence (TI) activities to ensure an early identification of appropriate technologies and other (weak) signals. One base activity of TI is technology monitoring, which is defined as the systematic tracking of developments within a specified topic of interest as well as related trends over a long period of time. Due to the very large number of dynamically changing parameters within the technological and the market environment of a company as well as their possible interdependencies, it is necessary to focus technology monitoring on specific indicators or other criteria, which are able to point out technological developments and market changes. In addition to the execution of a literature review on existing approaches, which mainly propose patent-based indicators, it is examined in this paper whether indicator systems from other branches such as risk management or economic research could be transferred to technology monitoring in order to enable an efficient and focused technology monitoring for companies.

Keywords: technology forecasting, technology indicator, technology intelligence, technology management, technology monitoring

Procedia PDF Downloads 470
10365 Kuehne + Nagel's PharmaChain: IoT-Enabled Product Monitoring Using Radio Frequency Identification

Authors: Rebecca Angeles

Abstract:

This case study features the Kuehne + Nagel PharmaChain solution for ‘cold chain’ pharmaceutical and biologic product shipments with IOT-enabled features for shipment temperature and location tracking. Using the case study method and content analysis, this research project investigates the application of the structurational model of technology theory introduced by Orlikowski in order to interpret the firm’s entry and participation in the IOT-impelled marketplace.

Keywords: Internet of Things (IOT), radio frequency identification (RFID), structurational model of technology (Orlikowski), supply chain management

Procedia PDF Downloads 232
10364 Disability, Stigma and In-Group Identification: An Exploration across Different Disability Subgroups

Authors: Sharmila Rathee

Abstract:

Individuals with disability/ies often face negative attitudes, discrimination, exclusion, and inequality of treatment due to stigmatization and stigmatized treatment. While a significant number of studies in field of stigma suggest that group-identification has positive consequences for stigmatized individuals, ironically very miniscule empirical work in sight has attempted to investigate in-group identification as a coping measure against stigma, humiliation and related experiences among disability group. In view of death of empirical research on in-group identification among disability group, through present work, an attempt has been made to examine the experiences of stigma, humiliation, and in-group identification among disability group. Results of the study suggest that use of in-group identification as a coping strategy is not uniform across members of disability group and degree of in-group identification differs across different sub-groups of disability groups. Further, in-group identification among members of disability group depends on variables like degree and impact of disability, factors like onset of disability, nature, and visibility of disability, educational experiences and resources available to deal with disabling conditions.

Keywords: disability, stigma, in-group identification, social identity

Procedia PDF Downloads 324
10363 Iot-Based Interactive Patient Identification and Safety Management System

Authors: Jonghoon Chun, Insung Kim, Jonghyun Lim, Gun Ro

Abstract:

We believe that it is possible to provide a solution to reduce patient safety accidents by displaying correct medical records and prescription information through interactive patient identification. Our system is based on the use of smart bands worn by patients and these bands communicate with the hybrid gateways which understand both BLE and Wifi communication protocols. Through the convergence of low-power Bluetooth (BLE) and hybrid gateway technology, which is one of short-range wireless communication technologies, we implement ‘Intelligent Patient Identification and Location Tracking System’ to prevent medical malfunction frequently occurring in medical institutions. Based on big data and IOT technology using MongoDB, smart band (BLE, NFC function) and hybrid gateway, we develop a system to enable two-way communication between medical staff and hospitalized patients as well as to store locational information of the patients in minutes. Based on the precise information provided using big data systems, such as location tracking and movement of in-hospital patients wearing smart bands, our findings include the fact that a patient-specific location tracking algorithm can more efficiently operate HIS (Hospital Information System) and other related systems. Through the system, we can always correctly identify patients using identification tags. In addition, the system automatically determines whether the patient is a scheduled for medical service by the system in use at the medical institution, and displays the appropriateness of the medical treatment and the medical information (medical record and prescription information) on the screen and voice. This work was supported in part by the Korea Technology and Information Promotion Agency for SMEs (TIPA) grant funded by the Korean Small and Medium Business Administration (No. S2410390).

Keywords: BLE, hybrid gateway, patient identification, IoT, safety management, smart band

Procedia PDF Downloads 311
10362 Abating the Barriers to the Deployment of RFID for Construction Project Delivery in South Africa

Authors: Matthew O. Ikuabe, Ayodeji E. Oke, Clinton O. Aigbavboa, Douglas O. Aghimien

Abstract:

The use of technological innovations have been touted to be beneficial in the delivery of construction projects. Particularly, Radio Frequency Identification (RFID) technology is widely regarded to be of immense advantage for the management of construction projects. This study focused on evaluating the barriers to the use of Radio Frequency Identification (RFID) technology for the delivery of construction projects. Using Gauteng Provincein South Africa as the study area, questionnaire was used in eliciting responses from construction professionals, which made up the population of the study. Retrieved data was analysed using Mean Item Score and One-Sample t-test. Findings from the study showed that the most significant barriers to the deployment of RFID for construction project delivery are high cost and lack of awareness. Conclusively, the study made recommendations that would aid in the abatement of the barriers to the use of RFID technology for construction project delivery.

Keywords: barriers, construction, project delivery, RFID

Procedia PDF Downloads 205
10361 Forensic Challenges in Source Device Identification for Digital Videos

Authors: Mustapha Aminu Bagiwa, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Suleman Khan

Abstract:

Video source device identification has become a problem of concern in numerous domains especially in multimedia security and digital investigation. This is because videos are now used as evidence in legal proceedings. Source device identification aim at identifying the source of digital devices using the content they produced. However, due to affordable processing tools and the influx in digital content generating devices, source device identification is still a major problem within the digital forensic community. In this paper, we discuss source device identification for digital videos by identifying techniques that were proposed in the literature for model or specific device identification. This is aimed at identifying salient open challenges for future research.

Keywords: video forgery, source camcorder, device identification, forgery detection

Procedia PDF Downloads 631
10360 Identification of Dynamic Friction Model for High-Precision Motion Control

Authors: Martin Goubej, Tomas Popule, Alois Krejci

Abstract:

This paper deals with experimental identification of mechanical systems with nonlinear friction characteristics. Dynamic LuGre friction model is adopted and a systematic approach to parameter identification of both linear and nonlinear subsystems is given. The identification procedure consists of three subsequent experiments which deal with the individual parts of plant dynamics. The proposed method is experimentally verified on an industrial-grade robotic manipulator. Model fidelity is compared with the results achieved with a static friction model.

Keywords: mechanical friction, LuGre model, friction identification, motion control

Procedia PDF Downloads 413
10359 Identification of Nonlinear Systems Structured by Hammerstein-Wiener Model

Authors: A. Brouri, F. Giri, A. Mkhida, A. Elkarkri, M. L. Chhibat

Abstract:

Standard Hammerstein-Wiener models consist of a linear subsystem sandwiched by two memoryless nonlinearities. Presently, the linear subsystem is allowed to be parametric or not, continuous- or discrete-time. The input and output nonlinearities are polynomial and may be noninvertible. A two-stage identification method is developed such the parameters of all nonlinear elements are estimated first using the Kozen-Landau polynomial decomposition algorithm. The obtained estimates are then based upon in the identification of the linear subsystem, making use of suitable pre-ad post-compensators.

Keywords: nonlinear system identification, Hammerstein-Wiener systems, frequency identification, polynomial decomposition

Procedia PDF Downloads 511
10358 Acoustic Analysis for Comparison and Identification of Normal and Disguised Speech of Individuals

Authors: Surbhi Mathur, J. M. Vyas

Abstract:

Although the rapid development of forensic speaker recognition technology has been conducted, there are still many problems to be solved. The biggest problem arises when the cases involving disguised voice samples come across for the purpose of examination and identification. Such type of voice samples of anonymous callers is frequently encountered in crimes involving kidnapping, blackmailing, hoax extortion and many more, where the speaker makes a deliberate effort to manipulate their natural voice in order to conceal their identity due to the fear of being caught. Voice disguise causes serious damage to the natural vocal parameters of the speakers and thus complicates the process of identification. The sole objective of this doctoral project is to find out the possibility of rendering definite opinions in cases involving disguised speech by experimentally determining the effects of different disguise forms on personal identification and percentage rate of speaker recognition for various voice disguise techniques such as raised pitch, lower pitch, increased nasality, covering the mouth, constricting tract, obstacle in mouth etc by analyzing and comparing the amount of phonetic and acoustic variation in of artificial (disguised) and natural sample of an individual, by auditory as well as spectrographic analysis.

Keywords: forensic, speaker recognition, voice, speech, disguise, identification

Procedia PDF Downloads 368
10357 Evaluation and Selection of Drilling Technologies: An Application of Portfolio Analysis Matrix in South Azadgan Oilfield

Authors: M. Maleki Sadabad, A. Pointing, N. Marashi

Abstract:

With respect to the role and increasing importance of technology for countries development, in recent decades technology development has paid attention in a systematic form. Nowadays the markets face with highly complicated and competitive conditions in foreign markets, therefore, evaluation and selection of technology effectiveness and also formulating technology strategy have changed into a vital subject for some organizations. The study introduces the standards of empowerment evaluation and technology attractiveness especially strategic technologies which explain the way of technology evaluation, selection and finally formulating suitable technology strategy in the field of drilling in South Azadegan oil field. The study firstly identifies the key challenges of oil fields in order to evaluate the technologies in field of drilling in South Azadegan oil field through an interview with the experts of industry and then they have been prioritised. In the following, the existing and new technologies were identified to solve the challenges of South Azadegan oil field. In order to explore the ability, availability, and attractiveness of every technology, a questionnaire based on Julie indices has been designed and distributed among the industry elites. After determining the score of ability, availability and attractiveness, every technology which has been obtained by the average of expert’s ideas, the technology package has been introduced by Morin’s model. The matrix includes four areas which will follow the especial strategy. Finally, by analysing the above matrix, the technology options have been suggested in order to select and invest.

Keywords: technology, technology identification, drilling technologies, technology capability

Procedia PDF Downloads 142
10356 Structural Damage Detection Using Sensors Optimally Located

Authors: Carlos Alberto Riveros, Edwin Fabián García, Javier Enrique Rivero

Abstract:

The measured data obtained from sensors in continuous monitoring of civil structures are mainly used for modal identification and damage detection. Therefore when modal identification analysis is carried out the quality in the identification of the modes will highly influence the damage detection results. It is also widely recognized that the usefulness of the measured data used for modal identification and damage detection is significantly influenced by the number and locations of sensors. The objective of this study is the numerical implementation of two widely known optimum sensor placement methods in beam-like structures

Keywords: optimum sensor placement, structural damage detection, modal identification, beam-like structures.

Procedia PDF Downloads 431
10355 Self-Tuning Robot Control Based on Subspace Identification

Authors: Mathias Marquardt, Peter Dünow, Sandra Baßler

Abstract:

The paper describes the use of subspace based identification methods for auto tuning of a state space control system. The plant is an unstable but self balancing transport robot. Because of the unstable character of the process it has to be identified from closed loop input-output data. Based on the identified model a state space controller combined with an observer is calculated. The subspace identification algorithm and the controller design procedure is combined to a auto tuning method. The capability of the approach was verified in a simulation experiments under different process conditions.

Keywords: auto tuning, balanced robot, closed loop identification, subspace identification

Procedia PDF Downloads 380
10354 Distributed Perceptually Important Point Identification for Time Series Data Mining

Authors: Tak-Chung Fu, Ying-Kit Hung, Fu-Lai Chung

Abstract:

In the field of time series data mining, the concept of the Perceptually Important Point (PIP) identification process is first introduced in 2001. This process originally works for financial time series pattern matching and it is then found suitable for time series dimensionality reduction and representation. Its strength is on preserving the overall shape of the time series by identifying the salient points in it. With the rise of Big Data, time series data contributes a major proportion, especially on the data which generates by sensors in the Internet of Things (IoT) environment. According to the nature of PIP identification and the successful cases, it is worth to further explore the opportunity to apply PIP in time series ‘Big Data’. However, the performance of PIP identification is always considered as the limitation when dealing with ‘Big’ time series data. In this paper, two distributed versions of PIP identification based on the Specialized Binary (SB) Tree are proposed. The proposed approaches solve the bottleneck when running the PIP identification process in a standalone computer. Improvement in term of speed is obtained by the distributed versions.

Keywords: distributed computing, performance analysis, Perceptually Important Point identification, time series data mining

Procedia PDF Downloads 433
10353 Genetic Algorithms for Parameter Identification of DC Motor ARMAX Model and Optimal Control

Authors: A. Mansouri, F. Krim

Abstract:

This paper presents two techniques for DC motor parameters identification. We propose a numerical method using the adaptive extensive recursive least squares (AERLS) algorithm for real time parameters estimation. This algorithm, based on minimization of quadratic criterion, is realized in simulation for parameters identification of DC motor autoregressive moving average with extra inputs (ARMAX). As advanced technique, we use genetic algorithms (GA) identification with biased estimation for high dynamic performance speed regulation. DC motors are extensively used in variable speed drives, for robot and solar panel trajectory control. GA effectiveness is derived through comparison of the two approaches.

Keywords: ARMAX model, DC motor, AERLS, GA, optimization, parameter identification, PID speed regulation

Procedia PDF Downloads 379
10352 Integration of Wireless Sensor Networks and Radio Frequency Identification (RFID): An Assesment

Authors: Arslan Murtaza

Abstract:

RFID (Radio Frequency Identification) and WSN (Wireless sensor network) are two significant wireless technologies that have extensive diversity of applications and provide limitless forthcoming potentials. RFID is used to identify existence and location of objects whereas WSN is used to intellect and monitor the environment. Incorporating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. It can be widely used in stock management, asset tracking, asset counting, security, military, environmental monitoring and forecasting, healthcare, intelligent home, intelligent transport vehicles, warehouse management, and precision agriculture. This assessment presents a brief introduction of RFID, WSN, and integration of WSN and RFID, and then applications related to both RFID and WSN. This assessment also deliberates status of the projects on RFID technology carried out in different computing group projects to be taken on WSN and RFID technology.

Keywords: wireless sensor network, RFID, embedded sensor, Wi-Fi, Bluetooth, integration, time saving, cost efficient

Procedia PDF Downloads 334
10351 Pro-BluCRM: A Proactive Customer Relationship Management System Using Bluetooth

Authors: Mohammad Alawairdhi

Abstract:

Customer Relationship Management (CRM) started gaining attention as late as the 1990s, and since then efforts are ongoing to define the domain’s precise specifications. There is yet no single agreed upon definition. However, a predominant majority perceives CRM as a mechanism for enhancing interaction with customers, thereby strengthening the relationship between a business and its clients. From the perspective of Information Technology (IT) companies, CRM systems can be viewed as facilitating software products or services to automate the marketing, selling and servicing functions of an organization. In this paper, we have proposed a Bluetooth enabled CRM system for small- and medium-scale organizations. In the proposed system, Bluetooth technology works as an automatic identification token in addition to its common use as a communication channel. The system comprises a server side accompanied by a user-interface support for both client and server sides. The system has been tested in two environments and users have expressed ease of use, convenience and understandability as major advantages of the proposed solution.

Keywords: customer relationship management, CRM, bluetooth, automatic identification token

Procedia PDF Downloads 342
10350 Machine Learning Based Gender Identification of Authors of Entry Programs

Authors: Go Woon Kwak, Siyoung Jun, Soyun Maeng, Haeyoung Lee

Abstract:

Entry is an education platform used in South Korea, created to help students learn to program, in which they can learn to code while playing. Using the online version of the entry, teachers can easily assign programming homework to the student and the students can make programs simply by linking programming blocks. However, the programs may be made by others, so that the authors of the programs should be identified. In this paper, as the first step toward author identification of entry programs, we present an artificial neural network based classification approach to identify genders of authors of a program written in an entry. A neural network has been trained from labeled training data that we have collected. Our result in progress, although preliminary, shows that the proposed approach could be feasible to be applied to the online version of entry for gender identification of authors. As future work, we will first use a machine learning technique for age identification of entry programs, which would be the second step toward the author identification.

Keywords: artificial intelligence, author identification, deep neural network, gender identification, machine learning

Procedia PDF Downloads 323
10349 Methodology for the Integration of Object Identification Processes in Handling and Logistic Systems

Authors: L. Kiefer, C. Richter, G. Reinhart

Abstract:

The uprising complexity in production systems due to an increasing amount of variants up to customer innovated products leads to requirements that hierarchical control systems are not able to fulfil. Therefore, factory planners can install autonomous manufacturing systems. The fundamental requirement for an autonomous control is the identification of objects within production systems. In this approach an attribute-based identification is focused for avoiding dose-dependent identification costs. Instead of using an identification mark (ID) like a radio frequency identification (RFID)-Tag, an object type is directly identified by its attributes. To facilitate that it’s recommended to include the identification and the corresponding sensors within handling processes, which connect all manufacturing processes and therefore ensure a high identification rate and reduce blind spots. The presented methodology reduces the individual effort to integrate identification processes in handling systems. First, suitable object attributes and sensor systems for object identification in a production environment are defined. By categorising these sensor systems as well as handling systems, it is possible to match them universal within a compatibility matrix. Based on that compatibility further requirements like identification time are analysed, which decide whether the combination of handling and sensor system is well suited for parallel handling and identification within an autonomous control. By analysing a list of more than thousand possible attributes, first investigations have shown, that five main characteristics (weight, form, colour, amount, and position of subattributes as drillings) are sufficient for an integrable identification. This knowledge limits the variety of identification systems and leads to a manageable complexity within the selection process. Besides the procedure, several tools, as an example a sensor pool are presented. These tools include the generated specific expert knowledge and simplify the selection. The primary tool is a pool of preconfigured identification processes depending on the chosen combination of sensor and handling device. By following the defined procedure and using the created tools, even laypeople out of other scientific fields can choose an appropriate combination of handling devices and sensors which enable parallel handling and identification.

Keywords: agent systems, autonomous control, handling systems, identification

Procedia PDF Downloads 177
10348 Identification of Risks Associated with Process Automation Systems

Authors: J. K. Visser, H. T. Malan

Abstract:

A need exists to identify the sources of risks associated with the process automation systems within petrochemical companies or similar energy related industries. These companies use many different process automation technologies in its value chain. A crucial part of the process automation system is the information technology component featuring in the supervisory control layer. The ever-changing technology within the process automation layers and the rate at which it advances pose a risk to safe and predictable automation system performance. The age of the automation equipment also provides challenges to the operations and maintenance managers of the plant due to obsolescence and unavailability of spare parts. The main objective of this research was to determine the risk sources associated with the equipment that is part of the process automation systems. A secondary objective was to establish whether technology managers and technicians were aware of the risks and share the same viewpoint on the importance of the risks associated with automation systems. A conceptual model for risk sources of automation systems was formulated from models and frameworks in literature. This model comprised six categories of risk which forms the basis for identifying specific risks. This model was used to develop a questionnaire that was sent to 172 instrument technicians and technology managers in the company to obtain primary data. 75 completed and useful responses were received. These responses were analyzed statistically to determine the highest risk sources and to determine whether there was difference in opinion between technology managers and technicians. The most important risks that were revealed in this study are: 1) the lack of skilled technicians, 2) integration capability of third-party system software, 3) reliability of the process automation hardware, 4) excessive costs pertaining to performing maintenance and migrations on process automation systems, and 5) requirements of having third-party communication interfacing compatibility as well as real-time communication networks.

Keywords: distributed control system, identification of risks, information technology, process automation system

Procedia PDF Downloads 139
10347 Frequency Identification of Wiener-Hammerstein Systems

Authors: Brouri Adil, Giri Fouad

Abstract:

The problem of identifying Wiener-Hammerstein systems is addressed in the presence of two linear subsystems of structure totally unknown. Presently, the nonlinear element is allowed to be noninvertible. The system identification problem is dealt by developing a two-stage frequency identification method such a set of points of the nonlinearity are estimated first. Then, the frequency gains of the two linear subsystems are determined at a number of frequencies. The method involves Fourier series decomposition and only requires periodic excitation signals. All involved estimators are shown to be consistent.

Keywords: Wiener-Hammerstein systems, Fourier series expansions, frequency identification, automation science

Procedia PDF Downloads 535
10346 The Effect of Measurement Distribution on System Identification and Detection of Behavior of Nonlinearities of Data

Authors: Mohammad Javad Mollakazemi, Farhad Asadi, Aref Ghafouri

Abstract:

In this paper, we considered and applied parametric modeling for some experimental data of dynamical system. In this study, we investigated the different distribution of output measurement from some dynamical systems. Also, with variance processing in experimental data we obtained the region of nonlinearity in experimental data and then identification of output section is applied in different situation and data distribution. Finally, the effect of the spanning the measurement such as variance to identification and limitation of this approach is explained.

Keywords: Gaussian process, nonlinearity distribution, particle filter, system identification

Procedia PDF Downloads 515
10345 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 65
10344 Evaluation of the Patient Identification Process in Healthcare Facilities in a Brazilian City Area

Authors: Carmen Silvia Gabriel, Maria de Fátima Paiva Brito, Mariane de Paula Candido, Vanessa Barato Oliveira

Abstract:

Patient identification is a necessary practice to ensure patient safety in any healthcare environment, including emergency care units, test laboratories, home care and clinics. The present study aimed to provide evidence that can effectively contribute to practices concerning patient identification. Its objective was to investigate patient identification in basic healthcare units through patient safety standards. To do so, a descriptive and non-experimental research outline study was carried out to inquire how patient identification takes place in a particular situation. All technical manager nurses from the chosen healthcare facilities were included in the sample for the study. Data was collected in September of 2014 after approval from the Committee of Ethics. All researched institutions fit the same profile: they’re public facilities for general care with observation beds. None of them has a wristband identification protocol or policy. Only one institution mentioned using some kind of visual identification; namely, body tags separated by colors according to the type of care, but it still does not apply the recommended tags by the Brazilian Ministry of Health. This study allowed the authors to acknowledge how important the commitment from the whole healthcare team in the patient identification process is and also acknowledge how necessary it is to implement institutional policies that may aid the healthcare units in this area to promote a quality and safe patient care.

Keywords: patient safety, identification, nursing, emergency care units

Procedia PDF Downloads 406