Search results

1 – 10 of 664
Article
Publication date: 1 March 1998

Steve Smith

The new technology of RFID, intelligent tagging, has become widespread in some industries such as distribution and baggage handling, and is set to dominate retail security in the…

Abstract

The new technology of RFID, intelligent tagging, has become widespread in some industries such as distribution and baggage handling, and is set to dominate retail security in the near future. Library security and automation are tailor‐made applications for it which are ready to roll. What is it and what does it mean for Librarians?

Details

VINE, vol. 28 no. 3
Type: Research Article
ISSN: 0305-5728

Article
Publication date: 31 December 2006

Akio Sashima, Noriaki Izumi and Koichi Kurumatani

In the vision of pervasive computing, numerous heterogeneous devices, various information services, and users performing daily activities are physically co‐located in a…

Abstract

In the vision of pervasive computing, numerous heterogeneous devices, various information services, and users performing daily activities are physically co‐located in a environment. How can we coordinate the services and devices to assist a particular user in receiving a particular service so as to maximize the user’s satisfaction? To solve this human‐centered coordination issue, we propose an agent‐based service coordination framework for pervasive computing. It is called location‐aware middle agent framework. The middle agent takes account of the user location in cognitive way (based on location‐ontology), and determines best‐matched services for the user. Based on this coordination framework, we have developed a multi‐agent architecture for pervasive computing, called CONSORTS (Coordination System of Real‐world Transaction Services). In this paper, we first outline some requirements of the human‐centered service coordination in pervasive computing. Secondly, we describe location‐aware middle agent framework to fill the requirements. Lastly, we outline CONSORTS, an prototype of location‐aware middle agent framework, and two applications of CONSORTS, location‐aware information assistance services in a museum and wireless‐LAN based location systems on FIPA agent Networks.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 December 1996

Jack Hollingum

Explains how radio frequency tagging has established itself in Australia and the USA, where 915MHz is acceptable for this purpose and pulsed power allows read distances of 7m or…

Abstract

Explains how radio frequency tagging has established itself in Australia and the USA, where 915MHz is acceptable for this purpose and pulsed power allows read distances of 7m or more to be achieved with a passive (no batteries) tag. Points out that in Europe there is no one acceptable frequency available in every country, so a pioneer Australian company has adopted 458MHz for UK use and 433MHz for Germany and some other countries. Describes some of the successful applications so far and points to future possibilities including monitoring of BSE in cattle.

Details

Sensor Review, vol. 16 no. 4
Type: Research Article
ISSN: 0260-2288

Keywords

Content available
Article
Publication date: 1 March 2000

57

Abstract

Details

Assembly Automation, vol. 20 no. 1
Type: Research Article
ISSN: 0144-5154

Keywords

Article
Publication date: 1 September 1992

Kamaleddin Abdolrahimi

The success of a manufacturing corporation mostly depends on itsproduction decisions. The selection of production levels is a primaryresponsibility of management who should select…

Abstract

The success of a manufacturing corporation mostly depends on its production decisions. The selection of production levels is a primary responsibility of management who should select production levels that maximize the discounted value of the cash‐flow stream (NPV) resulting from the production projects. As a result, the need to evaluate the cash‐flow stream for various production levels is becoming more frequent. Provides an explicit model for the economic evaluation of various attainable production levels. The model, developed in this study, under the condition of a time‐dependent elastic demand, for each year compares a series of gross incomes G, that results from the various attainable production amounts Q, with a corresponding series of minimum annual revenue requirements R. Based on these comparisons, it identifies the optimal production level and the unit selling price for a particular year where G‐R is a maximum and finally, based on the maximum G‐R values, it determines the NPV value. A computer program (written in PASCAL) is provided to implement the model on either a TI or IBM. The program is capable of displaying and printing the results. Because of the use of several levels of nesting, the top‐down programming technique is used in its design and implementation.

Details

International Journal of Operations & Production Management, vol. 12 no. 9
Type: Research Article
ISSN: 0144-3577

Keywords

Content available
Article
Publication date: 22 June 2012

148

Abstract

Details

Sensor Review, vol. 32 no. 3
Type: Research Article
ISSN: 0260-2288

Article
Publication date: 14 June 2019

Hirak Jyoti Hazarika and S. Ravikumar

The purpose of this paper is to explain how the author had carried out the implementation of the radio-frequency identification (RFID) system at Central Library, Fakiragram…

Abstract

Purpose

The purpose of this paper is to explain how the author had carried out the implementation of the radio-frequency identification (RFID) system at Central Library, Fakiragram College and to explain to the library professional on how to integrate RFID with Koha integrated library management system (ILMS) in their respective library without taking IT/technical experts assistance. This paper will encourage library professionals to implement RFID technology for the library security and embrace open source software in their institutions.

Design/methodology/approach

The paper describes the author’s practical experiences regarding implementation of the RFID system and integration of middleware RFID software with library management software.

Findings

From the present study, it was found that the library staff are having a positive attitude toward embracing RFID technology in their library. The present implementation of RFID technology in the studies area gives a clear picture about integrating a third-party software/tool like RFID to the existing systems and how the new system has helped the library to provide better service to their users

Research limitations/implications

There were some teething problems at the start between the Koha ILMS SIP2 software and the RFID system. The main issue faced while integration was with setting up the hostname, integrating the instance (i.e. database) and with setting up the port.

Practical implications

This paper will help librarians to implement RFID technology in a practical way to their libraries. The author implemented Koha ILMS with RFID system at the Central Library, Fakiragram College within 1 month and the author migrated data from common communication format (CCF) format to MARC 21 formats. CCF is basically used in SOUL 2.0 developed by INFLIBNET.

Originality/value

This study discusses issues and possible solutions in the process of implementing RFID applications for two innovative applications in library services. This will influence library professionals to learn Koha ILMS and RFID technology implement it in their libraries.

Details

Library Hi Tech News, vol. 36 no. 4
Type: Research Article
ISSN: 0741-9058

Keywords

Abstract

Details

Economic Complexity
Type: Book
ISBN: 978-0-44451-433-2

Article
Publication date: 1 May 1989

Emma Jean McKinin, Mary Ellen Sievert and E. Diane Johnson

Searchers need to develop a set of heuristics (a variety of problem solving tactics and operations) for searching full‐text databases. Those heuristics which have evolved for…

Abstract

Searchers need to develop a set of heuristics (a variety of problem solving tactics and operations) for searching full‐text databases. Those heuristics which have evolved for searching bibliographic databases are often not effective when applied to full‐text. Presented here are methods which can be helpful in increasing precision when searching full‐text journal files for items on a given topic at BRS. Mead Data Central and Dialog. All of the techniques are based on achieving some repetition of central concepts as expressed in natural language. Research in automatic indexing and in full‐text retrieval provides a theoretical justification for a heuristic of this type. Schematic representations of strategies and sample searches which represent application of the techniques on each of the three systems are provided.

Details

Online Review, vol. 13 no. 5
Type: Research Article
ISSN: 0309-314X

Article
Publication date: 1 September 1994

Peter Hawkes

Examines the “Supertag” automatic identification system which is aninnovative electronic replacement for barcodes and which can also function asan anti shoplifting device. Each…

510

Abstract

Examines the “Supertag” automatic identification system which is an innovative electronic replacement for barcodes and which can also function as an anti shoplifting device. Each Supertag is a single integrated circuit chip plus a printed flat aerial. Using radio links, Supertag readers are capable of multiple identification and counting at electronic speed. Outlines the technical developments which brought about “electronic counting” and compares them with conventional RFID systems. Describes the potential used for Supertag including its ability to “read” the entire contents of a supermarket trolley in a second, making it very attractive for use in the retail industry.

Details

Sensor Review, vol. 14 no. 3
Type: Research Article
ISSN: 0260-2288

Keywords

1 – 10 of 664