Search results
1 – 10 of over 5000David Simplot‐Ryl, Ivan Stojmenovic, Aleksandar Micic and Amiya Nayak
Radio frequency identification (RFID) is a technology for tracking objects that is expected to be widely adopted in very near future. A reader device sends probes to a set of RFID…
Abstract
Purpose
Radio frequency identification (RFID) is a technology for tracking objects that is expected to be widely adopted in very near future. A reader device sends probes to a set of RFID tags, which then respond to the request. A tag is recognized only when it is the only one to respond to the probe. Only reader has collision detection capability. The problem considered here is to minimize the number of probes necessary for reading all the tags, assuming that the number of tags is known in advance.
Design/methodology/approach
Well known binary and n‐ary partitioning algorithms can be applied to solve the problem for the case of known number of tags. A new randomized hybrid tag identification protocol has been proposed, which combines the two partitioning algorithms into a more efficient one. The new scheme optimizes the binary partition protocol for small values of n (e.g. n=2, 3, 4). The hybrid scheme then applies n‐ary partition protocol on the whole set, followed by binary partition on the tags that caused collision.
Findings
It is analytically proved that the expected number of time slots in the hybrid algorithm with known number of users is less than 2.20 n. Performance of these algorithms was also evaluated experimentally, and an improvement from en to approximately 2.15 n was obtained.
Originality/value
The algorithm shown here is efficient both by theory and practice and outperforms existing ones.
Details
Keywords
Ian Phau and Denise Ong
The purpose of this paper is to examine how consumers respond to environmental claims of three types contained in promotional messages attributed to one respected “green” brand…
Abstract
Purpose
The purpose of this paper is to examine how consumers respond to environmental claims of three types contained in promotional messages attributed to one respected “green” brand and one mainstream leisure clothing.
Design/methodology/approach
A mall‐intercept questionnaire‐based survey in one city in Australia collected responses from 380 respondents, who rated environmental claims contained in promotional messages delivered via garment tags attached to T‐shirts.
Findings
Shoppers responded more positively to product‐related messages than cause‐related messages. They found environmental claims to be more credible if attributed to the green brands than to the neutral brand.
Research limitations/implications
Future research might focus on the “green” market segment rather than interacting with the general population, and devise niche marketing strategies to clothes retailers. There is also room for more vivid pro‐green statements as test stimuli, perhaps generated by in‐depth qualitative research.
Practical implications
Though consumers are becoming increasingly green‐minded, the result is not necessarily more consumption of green products, but “better” consumption behaviour in general. Retailers should build a store image that clearly transmits their green credentials, as a proxy for the quality and nature of merchandise they carry.
Originality/value
Relatively little is known about green brands and environmental message appeals in clothes marketing, and no study has yet focused on Australia.
Details
Keywords
Ter-Feng Wu, Pu-Sheng Tsai, Nien-Tsu Hu and Jen-Yang Chen
Visually impaired people have long been living in the dark. They cannot realize the colorful world with their vision, so they rely on hearing, touch and smell to feel the space…
Abstract
Purpose
Visually impaired people have long been living in the dark. They cannot realize the colorful world with their vision, so they rely on hearing, touch and smell to feel the space they live in. Lacking image information, they face challenges in the external environment and barrier spaces. They face danger that is hundreds of times higher than that faced by normal people. Especially during outdoor activities, they can only explore the surrounding environment aided by their hearing and crutches and then based on a vague impression speculate where they are located. To let the blind confidently take each step, this paper proposes sticking the electronic tag of the radio-frequency identification (RFID) system on the back of guide bricks.
Design/methodology/approach
Thus, the RFID reader, ultrasonic sensor and voice chip on a wheeled mobile robot link the front end to the crutch. Once the blind person nears a guide brick, the RFID will read the message on the tag through the voice broadcast system, and a voice will inform the visually impaired person of the direction to walk and information of the surrounding environment. In addition, the CMOS image sensor set up in the wheeled mobile robot is used to detect the black marking on the guide brick and to guide the blind to walk forward or turn around between the two markings. Finally, the lithium battery charging control unit was installed on the wheeled mobile robot. The ATtiny25 microcontroller conducts the battery charge and discharge control and monitoring of the current battery capacity.
Findings
The development of this system will let visually impaired people acquire environmental information, road guidance function and nearby traffic information.
Originality/value
Through rich spatial environment messages, the blind can have the confidence and courage to go outside.
Details
Keywords
Guellil Imane, Darwish Kareem and Azouaou Faical
This paper aims to propose an approach to automatically annotate a large corpus in Arabic dialect. This corpus is used in order to analyse sentiments of Arabic users on social…
Abstract
Purpose
This paper aims to propose an approach to automatically annotate a large corpus in Arabic dialect. This corpus is used in order to analyse sentiments of Arabic users on social medias. It focuses on the Algerian dialect, which is a sub-dialect of Maghrebi Arabic. Although Algerian is spoken by roughly 40 million speakers, few studies address the automated processing in general and the sentiment analysis in specific for Algerian.
Design/methodology/approach
The approach is based on the construction and use of a sentiment lexicon to automatically annotate a large corpus of Algerian text that is extracted from Facebook. Using this approach allow to significantly increase the size of the training corpus without calling the manual annotation. The annotated corpus is then vectorized using document embedding (doc2vec), which is an extension of word embeddings (word2vec). For sentiments classification, the authors used different classifiers such as support vector machines (SVM), Naive Bayes (NB) and logistic regression (LR).
Findings
The results suggest that NB and SVM classifiers generally led to the best results and MLP generally had the worst results. Further, the threshold that the authors use in selecting messages for the training set had a noticeable impact on recall and precision, with a threshold of 0.6 producing the best results. Using PV-DBOW led to slightly higher results than using PV-DM. Combining PV-DBOW and PV-DM representations led to slightly lower results than using PV-DBOW alone. The best results were obtained by the NB classifier with F1 up to 86.9 per cent.
Originality/value
The principal originality of this paper is to determine the right parameters for automatically annotating an Algerian dialect corpus. This annotation is based on a sentiment lexicon that was also constructed automatically.
Details
Keywords
LON networks constitute a class of technology that allows intelligent devices such as actuators and sensors to communicate with one another using a standard protocol. In this way…
Abstract
LON networks constitute a class of technology that allows intelligent devices such as actuators and sensors to communicate with one another using a standard protocol. In this way, a LON network is similar to a local area network (LAN) that allows office computers to communicate with each other. LON technology supports distributed, peer‐to‐peer communications. Individual network devices can communicate directly with one another, and a central control system is not required.
Giulio Zecca, Paul Couderc, Michel Banâtre and Roberto Beraldi
The purpose of this paper is to show how a swarm of robots can cooperate to achieve a common task, in a totally distributed and autonomous way, by exploiting powerful clues…
Abstract
Purpose
The purpose of this paper is to show how a swarm of robots can cooperate to achieve a common task, in a totally distributed and autonomous way, by exploiting powerful clues contained in some devices that are distributed in the environment. This system exploits a coordination mechanism that is twofold, using radio frequency identification (RFID) tags for spatial coordination, and wireless robot‐to‐robot communication for the temporal and semantic synchronization.
Design/methodology/approach
Progress in the pervasive computing field has led to the distribution of knowledge and computational power in the environment, rather than condensing it in a single, powerful entity. This vision of ambient intelligence is supported by the interchange of information between physically sparse agents cooperating to achieve a common goal. An emerging method for this kind of collaboration considers the agents as insects in a swarm, having the possibility of communicating directly or indirectly with each other. The goal is to fulfill a common task, showing that a collaborative behavior can be useful in the real world. The paper focuses on a technique for the coordination of swarm‐robots with low capabilities, driven by instructions learned from RFID tags used as distributed pervasive memories. These robots exploit ubiquitous computing to regroup in a synchronization area, make a formation in space, coordinate with team‐mates in the same zone, and finally complete a cooperative task. The algorithm is validated through a simulation environment, showing its applicability and performance, before the real implementation on Roomba‐like robots.
Findings
The goal of the research is to prove the feasibility of such a novel approach. It is observed that a swarm of robots can achieve a good degree of autonomous cooperation without a central infrastructure or global network, carrying out a goal in a fair time.
Originality/value
The value is given by the benefits of splitting the synchronization semantics into two levels: space, by exploiting RFID landmarks; and time, by exploiting wireless short‐range communication. RFID tags are used to distribute computational power and actively interact with the surrounding areas, allowing to learn and modify the state of the environment. Robot‐to‐robot communication, instead, is used for providing timing and semantic information. In the proposal, this augmented environment is used to allow a good level of coordination among robots, both in time and space, with the aim of building a cooperative system.
Details
Keywords
Bing-Chang Chen, Her-Tyan Yeh and Che-Chiang Wang
The purpose of this paper is to complete the following works: construct RFID integration mechanism in the supply chain; build mutual authentication mechanism; and build the…
Abstract
Purpose
The purpose of this paper is to complete the following works: construct RFID integration mechanism in the supply chain; build mutual authentication mechanism; and build the transfer mechanism in supply chain.
Design/methodology/approach
In order to transfer RFID tag information to others safely in mobile RFID supply chain circumstances, the authors propose a RFID authentication mechanism which can ensure the identity and make the mutual authentication. Moreover, the authors propose a secure transfer method of ownership for the specific role in different regions under the structure of Mobile RFID.
Findings
The task of administrator server is to check the order, store the merchandise information, distribute the authority, certify the security and transfer the ownership. It can make the whole supply chain more mobility, and transfer faster.
Originality/value
The goals of this research are to achieve mainly: using mobile RFID system to design secure mutual authentication mechanism, transfer mechanisms with faster transfer and authority distribution. The authors introduce the security authentication and competence transfer mechanism in supply chain.
Details
Keywords
Antti Konttila, Marja Harjumaa, Salla Muuraiskangas, Mikko Jokela and Minna Isomursu
This article aims to explore the possibilities and use of a mobile technology‐supported audio annotation system that can be used for attaching free‐formatted audio annotations to…
Abstract
Purpose
This article aims to explore the possibilities and use of a mobile technology‐supported audio annotation system that can be used for attaching free‐formatted audio annotations to physical objects. The solution can help visually impaired people to identify objects and associate additional information with these objects.
Design/methodology/approach
A human‐centred design approach was adopted in the system's development and potential end‐users were involved in the development process. In order to evaluate the emerging use cases, as well as the usefulness and usability of the application, a qualitative field trial was conducted with ten visually impaired or blind users.
Findings
The findings show that visually impaired users learned to use the application easily and found it easy and robust to use. Most users responded positively towards the idea of tagging items with their own voice messages. Some users found the technology very useful and saw many possibilities for using it in the future. The most common targets for tagging were food items; however, some users had difficulties in integrating the solution with their everyday practices.
Originality/value
This paper presents an innovative mobile phone application with a touch and audio user interface. The actual use cases describe the everyday needs of visually impaired people and this information might be valuable to service providers and technology developers. Also, the experiences gained from these trials can be used when developing software for the visually impaired on other platforms.
Details
Keywords
Aisha Aseeri and Omaimah Bamasag
In the past few years, HB-like protocols have gained much attention in the field of lightweight authentication protocols due to their efficient functioning and large potential…
Abstract
Purpose
In the past few years, HB-like protocols have gained much attention in the field of lightweight authentication protocols due to their efficient functioning and large potential applications in low-cost radio frequency identification tags, which are on the other side spreading so fast. However, most published HB protocols are vulnerable to man-in-the-middle attacks such as GRS or OOV attacks. The purpose of this research is to investigate security issues pertaining to HB-like protocols with an aim of improving their security and efficiency.
Design/methodology/approach
In this paper, a new and secure variant of HB family protocols named HB-MP* is proposed and designed, using the techniques of random rotation. The security of the proposed protocol is proven using formal proofs. Also, a prototype of the protocol is implemented to check its applicability, test the security in implementation and to compare its performance with the most related protocol.
Findings
The HB-MP* protocol is found secure against passive and active adversaries and is implementable within the tight resource constraints of today’s EPC-type RFID tags. Accordingly, the HB-MP* protocol provides higher security than previous HB-like protocols without sacrificing performance.
Originality/value
This paper proposes a new HB variant called HB-MP* that tries to be immune against the pre-mentioned attacks and at the same time keeping the simple structure. It will use only lightweight operations to randomize the rotation of the secret.
Details
Keywords
Karen H. Hyllegard, Jennifer Paff Ogle and Ruoh-Nan Yan
The purpose of this paper is to explore consumers’ responses to prosocial marketing claims presented on apparel hang tags. Guided by the theory of reasoned of action, this study…
Abstract
Purpose
The purpose of this paper is to explore consumers’ responses to prosocial marketing claims presented on apparel hang tags. Guided by the theory of reasoned of action, this study examined the impact of varied prosocial claims (environment, labor, cancer charity) upon college students’ evaluations of hang tags used to promote university-branded apparel (i.e. t-shirts) as well as their attitudes and patronage intentions toward the apparel.
Design/methodology/approach
An intercept survey approach, with an experimental design component, was used to administer a written questionnaire to 262 college students. The experimental design component required participants to examine a university-branded t-shirt and to read the information provided on the product hang tag attached to the t-shirt.
Findings
In total, 60 percent of college students read apparel hang tags on a very frequent or frequent basis to gain information about brand name, care instructions, and fiber content. Further, college students evaluated apparel hang tags featuring prosocial marketing claims more positively than they evaluated hang tags with no prosocial marketing claim. In turn, these evaluations positively predicted the amount of money students were willing to pay for a university-branded t-shirt as well as their attitudes and purchase intentions toward university-branded apparel.
Research limitations/implications
Findings suggest that apparel companies engaged in socially responsible business practices may wish to develop hang tags that address both desired product attributes as well as company engagement in prosocial initiatives.
Originality/value
This study extends the understanding of the role that prosocial marketing claims play in informing consumer's attitudes and behaviors relative to apparel.
Details