Search results

1 – 10 of over 5000
Article
Publication date: 1 April 2006

David Simplot‐Ryl, Ivan Stojmenovic, Aleksandar Micic and Amiya Nayak

Radio frequency identification (RFID) is a technology for tracking objects that is expected to be widely adopted in very near future. A reader device sends probes to a set of RFID…

Abstract

Purpose

Radio frequency identification (RFID) is a technology for tracking objects that is expected to be widely adopted in very near future. A reader device sends probes to a set of RFID tags, which then respond to the request. A tag is recognized only when it is the only one to respond to the probe. Only reader has collision detection capability. The problem considered here is to minimize the number of probes necessary for reading all the tags, assuming that the number of tags is known in advance.

Design/methodology/approach

Well known binary and n‐ary partitioning algorithms can be applied to solve the problem for the case of known number of tags. A new randomized hybrid tag identification protocol has been proposed, which combines the two partitioning algorithms into a more efficient one. The new scheme optimizes the binary partition protocol for small values of n (e.g. n=2, 3, 4). The hybrid scheme then applies n‐ary partition protocol on the whole set, followed by binary partition on the tags that caused collision.

Findings

It is analytically proved that the expected number of time slots in the hybrid algorithm with known number of users is less than 2.20 n. Performance of these algorithms was also evaluated experimentally, and an improvement from en to approximately 2.15 n was obtained.

Originality/value

The algorithm shown here is efficient both by theory and practice and outperforms existing ones.

Details

Sensor Review, vol. 26 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 30 October 2007

Ian Phau and Denise Ong

The purpose of this paper is to examine how consumers respond to environmental claims of three types contained in promotional messages attributed to one respected “green” brand…

11117

Abstract

Purpose

The purpose of this paper is to examine how consumers respond to environmental claims of three types contained in promotional messages attributed to one respected “green” brand and one mainstream leisure clothing.

Design/methodology/approach

A mall‐intercept questionnaire‐based survey in one city in Australia collected responses from 380 respondents, who rated environmental claims contained in promotional messages delivered via garment tags attached to T‐shirts.

Findings

Shoppers responded more positively to product‐related messages than cause‐related messages. They found environmental claims to be more credible if attributed to the green brands than to the neutral brand.

Research limitations/implications

Future research might focus on the “green” market segment rather than interacting with the general population, and devise niche marketing strategies to clothes retailers. There is also room for more vivid pro‐green statements as test stimuli, perhaps generated by in‐depth qualitative research.

Practical implications

Though consumers are becoming increasingly green‐minded, the result is not necessarily more consumption of green products, but “better” consumption behaviour in general. Retailers should build a store image that clearly transmits their green credentials, as a proxy for the quality and nature of merchandise they carry.

Originality/value

Relatively little is known about green brands and environmental message appeals in clothes marketing, and no study has yet focused on Australia.

Details

Marketing Intelligence & Planning, vol. 25 no. 7
Type: Research Article
ISSN: 0263-4503

Keywords

Article
Publication date: 18 April 2017

Ter-Feng Wu, Pu-Sheng Tsai, Nien-Tsu Hu and Jen-Yang Chen

Visually impaired people have long been living in the dark. They cannot realize the colorful world with their vision, so they rely on hearing, touch and smell to feel the space…

405

Abstract

Purpose

Visually impaired people have long been living in the dark. They cannot realize the colorful world with their vision, so they rely on hearing, touch and smell to feel the space they live in. Lacking image information, they face challenges in the external environment and barrier spaces. They face danger that is hundreds of times higher than that faced by normal people. Especially during outdoor activities, they can only explore the surrounding environment aided by their hearing and crutches and then based on a vague impression speculate where they are located. To let the blind confidently take each step, this paper proposes sticking the electronic tag of the radio-frequency identification (RFID) system on the back of guide bricks.

Design/methodology/approach

Thus, the RFID reader, ultrasonic sensor and voice chip on a wheeled mobile robot link the front end to the crutch. Once the blind person nears a guide brick, the RFID will read the message on the tag through the voice broadcast system, and a voice will inform the visually impaired person of the direction to walk and information of the surrounding environment. In addition, the CMOS image sensor set up in the wheeled mobile robot is used to detect the black marking on the guide brick and to guide the blind to walk forward or turn around between the two markings. Finally, the lithium battery charging control unit was installed on the wheeled mobile robot. The ATtiny25 microcontroller conducts the battery charge and discharge control and monitoring of the current battery capacity.

Findings

The development of this system will let visually impaired people acquire environmental information, road guidance function and nearby traffic information.

Originality/value

Through rich spatial environment messages, the blind can have the confidence and courage to go outside.

Article
Publication date: 2 September 2019

Guellil Imane, Darwish Kareem and Azouaou Faical

This paper aims to propose an approach to automatically annotate a large corpus in Arabic dialect. This corpus is used in order to analyse sentiments of Arabic users on social…

Abstract

Purpose

This paper aims to propose an approach to automatically annotate a large corpus in Arabic dialect. This corpus is used in order to analyse sentiments of Arabic users on social medias. It focuses on the Algerian dialect, which is a sub-dialect of Maghrebi Arabic. Although Algerian is spoken by roughly 40 million speakers, few studies address the automated processing in general and the sentiment analysis in specific for Algerian.

Design/methodology/approach

The approach is based on the construction and use of a sentiment lexicon to automatically annotate a large corpus of Algerian text that is extracted from Facebook. Using this approach allow to significantly increase the size of the training corpus without calling the manual annotation. The annotated corpus is then vectorized using document embedding (doc2vec), which is an extension of word embeddings (word2vec). For sentiments classification, the authors used different classifiers such as support vector machines (SVM), Naive Bayes (NB) and logistic regression (LR).

Findings

The results suggest that NB and SVM classifiers generally led to the best results and MLP generally had the worst results. Further, the threshold that the authors use in selecting messages for the training set had a noticeable impact on recall and precision, with a threshold of 0.6 producing the best results. Using PV-DBOW led to slightly higher results than using PV-DM. Combining PV-DBOW and PV-DM representations led to slightly lower results than using PV-DBOW alone. The best results were obtained by the NB classifier with F1 up to 86.9 per cent.

Originality/value

The principal originality of this paper is to determine the right parameters for automatically annotating an Algerian dialect corpus. This annotation is based on a sentiment lexicon that was also constructed automatically.

Details

International Journal of Web Information Systems, vol. 15 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 1 January 1992

Harold M. Rabbie

LON networks constitute a class of technology that allows intelligent devices such as actuators and sensors to communicate with one another using a standard protocol. In this way…

Abstract

LON networks constitute a class of technology that allows intelligent devices such as actuators and sensors to communicate with one another using a standard protocol. In this way, a LON network is similar to a local area network (LAN) that allows office computers to communicate with each other. LON technology supports distributed, peer‐to‐peer communications. Individual network devices can communicate directly with one another, and a central control system is not required.

Details

Assembly Automation, vol. 12 no. 1
Type: Research Article
ISSN: 0144-5154

Article
Publication date: 20 November 2009

Giulio Zecca, Paul Couderc, Michel Banâtre and Roberto Beraldi

The purpose of this paper is to show how a swarm of robots can cooperate to achieve a common task, in a totally distributed and autonomous way, by exploiting powerful clues…

Abstract

Purpose

The purpose of this paper is to show how a swarm of robots can cooperate to achieve a common task, in a totally distributed and autonomous way, by exploiting powerful clues contained in some devices that are distributed in the environment. This system exploits a coordination mechanism that is twofold, using radio frequency identification (RFID) tags for spatial coordination, and wireless robot‐to‐robot communication for the temporal and semantic synchronization.

Design/methodology/approach

Progress in the pervasive computing field has led to the distribution of knowledge and computational power in the environment, rather than condensing it in a single, powerful entity. This vision of ambient intelligence is supported by the interchange of information between physically sparse agents cooperating to achieve a common goal. An emerging method for this kind of collaboration considers the agents as insects in a swarm, having the possibility of communicating directly or indirectly with each other. The goal is to fulfill a common task, showing that a collaborative behavior can be useful in the real world. The paper focuses on a technique for the coordination of swarm‐robots with low capabilities, driven by instructions learned from RFID tags used as distributed pervasive memories. These robots exploit ubiquitous computing to regroup in a synchronization area, make a formation in space, coordinate with team‐mates in the same zone, and finally complete a cooperative task. The algorithm is validated through a simulation environment, showing its applicability and performance, before the real implementation on Roomba‐like robots.

Findings

The goal of the research is to prove the feasibility of such a novel approach. It is observed that a swarm of robots can achieve a good degree of autonomous cooperation without a central infrastructure or global network, carrying out a goal in a fair time.

Originality/value

The value is given by the benefits of splitting the synchronization semantics into two levels: space, by exploiting RFID landmarks; and time, by exploiting wireless short‐range communication. RFID tags are used to distribute computational power and actively interact with the surrounding areas, allowing to learn and modify the state of the environment. Robot‐to‐robot communication, instead, is used for providing timing and semantic information. In the proposal, this augmented environment is used to allow a good level of coordination among robots, both in time and space, with the aim of building a cooperative system.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 2 no. 4
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 1 August 2016

Bing-Chang Chen, Her-Tyan Yeh and Che-Chiang Wang

The purpose of this paper is to complete the following works: construct RFID integration mechanism in the supply chain; build mutual authentication mechanism; and build the…

Abstract

Purpose

The purpose of this paper is to complete the following works: construct RFID integration mechanism in the supply chain; build mutual authentication mechanism; and build the transfer mechanism in supply chain.

Design/methodology/approach

In order to transfer RFID tag information to others safely in mobile RFID supply chain circumstances, the authors propose a RFID authentication mechanism which can ensure the identity and make the mutual authentication. Moreover, the authors propose a secure transfer method of ownership for the specific role in different regions under the structure of Mobile RFID.

Findings

The task of administrator server is to check the order, store the merchandise information, distribute the authority, certify the security and transfer the ownership. It can make the whole supply chain more mobility, and transfer faster.

Originality/value

The goals of this research are to achieve mainly: using mobile RFID system to design secure mutual authentication mechanism, transfer mechanisms with faster transfer and authority distribution. The authors introduce the security authentication and competence transfer mechanism in supply chain.

Details

Engineering Computations, vol. 33 no. 6
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 16 March 2012

Antti Konttila, Marja Harjumaa, Salla Muuraiskangas, Mikko Jokela and Minna Isomursu

This article aims to explore the possibilities and use of a mobile technology‐supported audio annotation system that can be used for attaching free‐formatted audio annotations to…

Abstract

Purpose

This article aims to explore the possibilities and use of a mobile technology‐supported audio annotation system that can be used for attaching free‐formatted audio annotations to physical objects. The solution can help visually impaired people to identify objects and associate additional information with these objects.

Design/methodology/approach

A human‐centred design approach was adopted in the system's development and potential end‐users were involved in the development process. In order to evaluate the emerging use cases, as well as the usefulness and usability of the application, a qualitative field trial was conducted with ten visually impaired or blind users.

Findings

The findings show that visually impaired users learned to use the application easily and found it easy and robust to use. Most users responded positively towards the idea of tagging items with their own voice messages. Some users found the technology very useful and saw many possibilities for using it in the future. The most common targets for tagging were food items; however, some users had difficulties in integrating the solution with their everyday practices.

Originality/value

This paper presents an innovative mobile phone application with a touch and audio user interface. The actual use cases describe the everyday needs of visually impaired people and this information might be valuable to service providers and technology developers. Also, the experiences gained from these trials can be used when developing software for the visually impaired on other platforms.

Details

Journal of Assistive Technologies, vol. 6 no. 1
Type: Research Article
ISSN: 1754-9450

Keywords

Article
Publication date: 5 September 2016

Aisha Aseeri and Omaimah Bamasag

In the past few years, HB-like protocols have gained much attention in the field of lightweight authentication protocols due to their efficient functioning and large potential…

Abstract

Purpose

In the past few years, HB-like protocols have gained much attention in the field of lightweight authentication protocols due to their efficient functioning and large potential applications in low-cost radio frequency identification tags, which are on the other side spreading so fast. However, most published HB protocols are vulnerable to man-in-the-middle attacks such as GRS or OOV attacks. The purpose of this research is to investigate security issues pertaining to HB-like protocols with an aim of improving their security and efficiency.

Design/methodology/approach

In this paper, a new and secure variant of HB family protocols named HB-MP* is proposed and designed, using the techniques of random rotation. The security of the proposed protocol is proven using formal proofs. Also, a prototype of the protocol is implemented to check its applicability, test the security in implementation and to compare its performance with the most related protocol.

Findings

The HB-MP* protocol is found secure against passive and active adversaries and is implementable within the tight resource constraints of today’s EPC-type RFID tags. Accordingly, the HB-MP* protocol provides higher security than previous HB-like protocols without sacrificing performance.

Originality/value

This paper proposes a new HB variant called HB-MP* that tries to be immune against the pre-mentioned attacks and at the same time keeping the simple structure. It will use only lightweight operations to randomize the rotation of the secret.

Details

International Journal of Pervasive Computing and Communications, vol. 12 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 8 July 2014

Karen H. Hyllegard, Jennifer Paff Ogle and Ruoh-Nan Yan

The purpose of this paper is to explore consumers’ responses to prosocial marketing claims presented on apparel hang tags. Guided by the theory of reasoned of action, this study…

1468

Abstract

Purpose

The purpose of this paper is to explore consumers’ responses to prosocial marketing claims presented on apparel hang tags. Guided by the theory of reasoned of action, this study examined the impact of varied prosocial claims (environment, labor, cancer charity) upon college students’ evaluations of hang tags used to promote university-branded apparel (i.e. t-shirts) as well as their attitudes and patronage intentions toward the apparel.

Design/methodology/approach

An intercept survey approach, with an experimental design component, was used to administer a written questionnaire to 262 college students. The experimental design component required participants to examine a university-branded t-shirt and to read the information provided on the product hang tag attached to the t-shirt.

Findings

In total, 60 percent of college students read apparel hang tags on a very frequent or frequent basis to gain information about brand name, care instructions, and fiber content. Further, college students evaluated apparel hang tags featuring prosocial marketing claims more positively than they evaluated hang tags with no prosocial marketing claim. In turn, these evaluations positively predicted the amount of money students were willing to pay for a university-branded t-shirt as well as their attitudes and purchase intentions toward university-branded apparel.

Research limitations/implications

Findings suggest that apparel companies engaged in socially responsible business practices may wish to develop hang tags that address both desired product attributes as well as company engagement in prosocial initiatives.

Originality/value

This study extends the understanding of the role that prosocial marketing claims play in informing consumer's attitudes and behaviors relative to apparel.

Details

Journal of Fashion Marketing and Management, vol. 18 no. 3
Type: Research Article
ISSN: 1361-2026

Keywords

1 – 10 of over 5000