To see the other types of publications on this topic, follow the link: Tag.

Dissertations / Theses on the topic 'Tag'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Tag.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Reimann, Oliver [Verfasser]. "Tag-free semisynthetic tau proteins and novel antibodies targeted against phospho-tau / Oliver Reimann." Berlin : Freie Universität Berlin, 2017. http://d-nb.info/1136608702/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sfiri, Ibrahim, and Junior Ndiaye. "Designprojekt Tag/Graffitti Remover." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-14962.

Full text
Abstract:
I kursen KPP106 som är ett examensarbete mot formgivning för högskoleingenjörer så ingår det att produktutveckla en produkt mot formgivning samt skriva en rapport kring arbetet. Denna rapport har valts att delas in i fyra delar för att kunna ge läsaren en bättre förståelse för projektets riktning. De olika faserna är: förståelse av problemet, en idégenerering för att kunna finna så många lösningar som möjligt, framtagning av väsentliga lösningar till projektet samt ett val av koncept och slutligen en bearbetning av det utvalda konceptet där det omvandlas till ett resultat. Projektdirektiv har getts från handledare och uppdragsgivaren Mauri Modin. Det främsta direktivet med projektet var att omforma den nuvarande produkten så att utseendet blev mer tilltalande. Produktens syfte är att sanera klotter. Det koncept som vidareutvecklats är en förbättrad modell av den nuvarande produkten där utseende, montering och ergonomi har förbättrats.
APA, Harvard, Vancouver, ISO, and other styles
3

Gülerman, Ender. "RFID Tag : RFID tag positioning and identification by using infrared and visual wavelength." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-19016.

Full text
Abstract:
This thesis project aims to develop an active Radio Frequency Identification tag (RFID) which uses an interesting method for positioning and ID detection. In this project, rather than classical ways of positioning methods such as triangulation or radio maps, infrared light and a camera with an infrared filter was used for the positioning. Tag identification detection is done by applying image analysis on camera images. When a specific part is wanted from the warehouse, this part is addressed through the active RFID system and the tag attached to that part starts to blink with the tag ID. A camera with an infrared filter above the goods in the ceiling finds the blinking infrared led, detects the tag’s position by image analysis, and confirms the ID with the requested ID number. A led transmitting visual light is used to ensure the tag also can be seen by the forklift driver in the warehouse environment when he is in close range of the part. First of all, related work and scientific papers were examined mostly from the IEEE database, which was instrumental in constructing this thesis project. Under the circumstances of low power consumption and the demands from the tag, additional possible components for an RFID tag such as an infrared led, a visual led, transistors for the LED amplifier stage and an LDO (Low-dropout) voltage regulator are chosen. Necessary technical calculations such as gain, power consumption are calculated. The RFID tag is built with these components, and transferred into the software environment .First the schematic is drawn and footprints created for the each component and the case styles are decided for transferring the circuit into the layout environment. For the radio circuit part which is used for the communication between the server and the tag, transmission lines of PCB demands are examined and the necessary calculations are made for impedance matching to prevent any disorder. After preparation of the PCB, gerber files are sent for the manufacturing process and the hardware part is completed. The components are mounted and the LED’s blinking time interval is set depending on the camera’s applicable frame speed, relevant tests for the ID detection and positioning (see fig.1). With optimisation of the time interval for recognition of the ID, an algorithm for the positioning of the RFID tag is developed and the related ID detection algorithm is developed for the real time applications by using a camera. As a result of this thesis project, instead of using complex systems for the positioning, such as triangulation or creating a radio map with multiple readers etc. a basic solution is produced as an alternative.  The efficiency of the system, the distance that allows the positioning and how applicable the system is are examined.
APA, Harvard, Vancouver, ISO, and other styles
4

Emerson, Jessica Merrill Thurston. "Tag clouds in software visualisation." Thesis, University of Canterbury. Computer Science and Software Engineering, 2014. http://hdl.handle.net/10092/10120.

Full text
Abstract:
Developing and maintaining software is a difficult task, and finding effective methods of understanding software is more necessary now than ever with the last few decades seeing a dramatic climb in the scale of software. Appropriate visualisations may enable greater understanding of the datasets we deal with in software engineering. As an aid for sense-making, visualisation is widely used in daily life (through graphics such as weather maps and road signs), as well as in other research domains, and is thought to be exceedingly beneficial. Unfortunately, there has not been widespread use of the multitude of techniques which have proposed for the software engineering domain. Tag clouds are a simple, text-based visualisation commonly found on the internet. Typically, implementations of tag clouds have not included rich interactive features which are necessary for data exploration. In this thesis, I introduce design considerations and a task set for enabling interaction in a tag cloud visualisation system. These considerations are based on an analysis of challenges in visualising software engineering data, and the perceptive influences of visual properties available in tag clouds. The design and implementation of interactive system Taggle based on these considerations is also presented, along with its broad-based evaluation. Evaluation approaches were informed by a systematic mapping study of previous tag cloud evaluation, providing an overview of existing research in the domain. The design of Taggle was improved following a heuristic evaluation by domain experts. Subsequent evaluations were divided into two parts - experiments focused on the tag cloud visualisation technique itself, and a task-based approach focused on the whole interactive system. As evidenced in the series of evaluative studies, the enhanced tag cloud features incorporated into Taggle enabled faster visual search response time, and the system could be used with minimal training to discover relevant information about an unknown software engineering dataset.
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, Thanh Chuyen. "Studies on Algorithms for Tag Identification and Tag Set Cardinality Estimation in Radio Frequency Identification Systems." 京都大学 (Kyoto University), 2013. http://hdl.handle.net/2433/174849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ghetti, Gabriele. "Localizzazione di tag passivi non lineari." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14276/.

Full text
Abstract:
In questo lavoro di tesi è stato realizzato un software di elaborazione dei segnali ricevuti da una etichetta (tag) RFID chipless con l’obiettivo di stimare la distanza del tag rispetto alla posizione dei ricevitori. Questo progetto trova importanti applicazioni legate alla localizzazione sia in ambito hi-tech che di largo consumo, come ad esempio la logistica, l’automotive e i sistemi di automazione. In questo progetto è stato curato specificamente il processo di acquisizione ed elaborazione dati, processando al calcolatore con l’ausilio del software MATLAB® i risultati provenienti da un simulatore circuitale del tag. In particolare, i dati da elaborare sono stati forniti da un progetto di ricerca correlato a questo dove è stato studiato e realizzato un tag RFID chipless passivo di tipo armonico non lineare.
APA, Harvard, Vancouver, ISO, and other styles
7

Bengtsson, Christofer, and Kristoffer Madsen. "PTAG - aktiv RFID-tag med GPS." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1648.

Full text
Abstract:
<p>Free2Move AB is developing products for the market within wireless communication</p><p>and identification, among those active RFID-tags. The company had an idea about</p><p>providing one of their active RFID tags with a GPS receiver and transmit positions via</p><p>an existing RFID protocol. Desire from the company was also the possibility to log</p><p>positions and measure temperature. The finished prototype should also be able to be</p><p>activated by movement. The company had proposal about components that were to be</p><p>used in the project. A large part of the work was to understand how these worked and</p><p>how to combine them to fulfill the requirements established in agreement with</p><p>supervisor at Free2Move. A PIC microcontroller was used in the design of the prototype</p><p>and software implemented for communication with GPS, RFID tag and other</p><p>components. The result was a working prototype where an existing RFID tag was</p><p>integrated in the same printed circuit board layout as the GPS receiver and other</p><p>components that were used in the project.</p>
APA, Harvard, Vancouver, ISO, and other styles
8

Kratzert, Sebastian, and Manuel Möller. "Dokumentation Netzwerk Chemnitzer Linux-Tag 2004." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400738.

Full text
Abstract:
Während sich der Chemnitzer Linux-Tag über die vergangenen fünf Jahre mit jedem Mal in der Zahl der Aussteller, Helfer und Gäste steigerte, wuchs auch in jedem Jahr das Tagungsnetzwerk. Den Informatikern wird häufig nachgesagt, daß sie wenig dokumentieren würden. Dieses Vorurteil traf auch für das Netzwerk der vergangenen Chemnitzer Linux-Tage zu. Unter anderem, um diesem Mißstand abzuhelfen, haben wir uns bemüht, möglichst detailliert Informationen über Konzept, eingesetzte Technologieen und konkrete Konfiguration des Tagungsnetzwerks des Chemnitzer Linux-Tags 2004 zusammenzutragen.
APA, Harvard, Vancouver, ISO, and other styles
9

Bellot, Arias Sergi. "Visual tag recognition for indoor positioning." Thesis, KTH, Signalbehandling, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-53768.

Full text
Abstract:
In recent years, camera-equipped mobile devices have undergone significant  evelopments due to increasing computational power as well as reduction of manufacturing unit costs. This has allowed for the development of new stateof- the-art applications, such as object analysis and detection. The focus of this thesis is the detection of visual markers which can be used in various applications such as positioning systems, object tracking and ‘Augmented Reality’. More specifically, the work has been motivated by ongoing research in indoor positioning, where global satellite navigation systems are not reliable enough. The goal is to develop a new visual tag detector, that is both simple and reliable. In the report the necessary background for understanding the development of the detector, as well as a detailed analysis of the current detectors, will be presented. Moreover, through an analysis of the current available image processing tools, we will present the proposed detector. Finally, in order to give a better overview of the system developed, complexity and performance results are presented, ending with some conclusions and suggested further lines of work.
APA, Harvard, Vancouver, ISO, and other styles
10

Liang, Cao. "Automatic Tag Recognition in Sport Events." Thesis, Högskolan i Gävle, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-14646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Chirammal, Ramakrishnan Rijwal. "RFID Tag Design and Range Improvement." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22921.

Full text
Abstract:
Radio Frequency Identification (RFID) is a short range radio technology for communication between two objects namely, a reader and a tag. Design of an RFID tag with the best range is always the motive of an RFID designer. In this thesis two RFID tags were simulated, designed and manufactured. The first one is a semi-passive RFID tag, which also serves as a discrete prototype tag for the research group to master RFID tag designs. The user can program and further extend the use of this tag according to the requirements. This RFID tag is provided with JTAG interface to program and debug. The read range of this prototype tag is found to be 1m with reader EIRP of 30dBm. The second design is a passive tag which can be commercialized. It achieves a competitive read range of 2.9m for reader EIRP of 21dBm. The read range when measured in a practical implementation inside a building corridor was 15m.
APA, Harvard, Vancouver, ISO, and other styles
12

Choubey, Rahul. "Tag recommendation using Latent Dirichlet Allocation." Thesis, Kansas State University, 2011. http://hdl.handle.net/2097/9785.

Full text
Abstract:
Master of Science<br>Department of Computing and Information Sciences<br>Doina Caragea<br>The vast amount of data present on the internet calls for ways to label and organize this data according to specific categories, in order to facilitate search and browsing activities. This can be easily accomplished by making use of folksonomies and user provided tags. However, it can be difficult for users to provide meaningful tags. Tag recommendation systems can guide the users towards informative tags for online resources such as websites, pictures, etc. The aim of this thesis is to build a system for recommending tags to URLs available through a bookmark sharing service, called BibSonomy. We assume that the URLs for which we recommend tags do not have any prior tags assigned to them. Two approaches are proposed to address the tagging problem, both of them based on Latent Dirichlet Allocation (LDA) Blei et al. [2003]. LDA is a generative and probabilistic topic model which aims to infer the hidden topical structure in a collection of documents. According to LDA, documents can be seen as mixtures of topics, while topics can be seen as mixtures of words (in our case, tags). The first approach that we propose, called topic words based approach, recommends the top words in the top topics representing a resource as tags for that particular resource. The second approach, called topic distance based approach, uses the tags of the most similar training resources (identified using the KL-divergence Kullback and Liebler [1951]) to recommend tags for a test untagged resource. The dataset used in this work was made available through the ECML/PKDD Discovery Challenge 2009. We construct the documents that are provided as input to LDA in two ways, thus producing two different datasets. In the first dataset, we use only the description and the tags (when available) corresponding to a URL. In the second dataset, we crawl the URL content and use it to construct the document. Experimental results show that the LDA approach is not very effective at recommending tags for new untagged resources. However, using the resource content gives better results than using the description only. Furthermore, the topic distance based approach is better than the topic words based approach, when only the descriptions are used to construct documents, while the topic words based approach works better when the contents are used to construct documents.
APA, Harvard, Vancouver, ISO, and other styles
13

Silva, Miguel Marinhas da. "Automated image tagging through tag propagation." Master's thesis, Faculdade de Ciências e Tecnologia, 2011. http://hdl.handle.net/10362/5963.

Full text
Abstract:
Trabalho apresentado no âmbito do Mestrado em Engenharia Informática, como requisito parcial Para obtenção do grau de Mestre em Engenharia Informática<br>Today, more and more data is becoming available on the Web. In particular, we have recently witnessed an exponential increase of multimedia content within various content sharing websites. While this content is widely available, great challenges have arisen to effectively search and browse such vast amount of content. A solution to this problem is to annotate information, a task that without computer aid requires a large-scale human effort. The goal of this thesis is to automate the task of annotating multimedia information with machine learning algorithms. We propose the development of a machine learning framework capable of doing automated image annotation in large-scale consumer photos. To this extent a study on state of art algorithms was conducted, which concluded with a baseline implementation of a k-nearest neighbor algorithm. This baseline was used to implement a more advanced algorithm capable of annotating images in the situations with limited training images and a large set of test images – thus, a semi-supervised approach. Further studies were conducted on the feature spaces used to describe images towards a successful integration in the developed framework. We first analyzed the semantic gap between the visual feature spaces and concepts present in an image, and how to avoid or mitigate this gap. Moreover, we examined how users perceive images by performing a statistical analysis of the image tags inserted by users. A linguistic and statistical expansion of image tags was also implemented. The developed framework withstands uneven data distributions that occur in consumer datasets, and scales accordingly, requiring few previously annotated data. The principal mechanism that allows easier scaling is the propagation of information between the annotated data and un-annotated data.
APA, Harvard, Vancouver, ISO, and other styles
14

Venkatakrishnan, Rajiv Krishnan. "Compact Metamaterial UHF RFID Tag Antennas." University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1313767918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kratzert, Sebastian Möller Manuel. "Dokumentation Netzwerk Chemnitzer Linux-Tag 2004." [S.l. : s.n.], 2004. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB11163725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Duarte, Laura Cardoso. "Tag questions in english and portuguese." reponame:Repositório Institucional da UFSC, 2013. https://repositorio.ufsc.br/handle/123456789/106240.

Full text
Abstract:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Florianópolis, 1985.<br>Made available in DSpace on 2013-12-05T19:49:39Z (GMT). No. of bitstreams: 1 321698.pdf: 3060924 bytes, checksum: 5a66c4e6f492b4dbeb9c2c479b4caa48 (MD5)
APA, Harvard, Vancouver, ISO, and other styles
17

Nguyen, Thi Hong Hanh [Verfasser]. "Recommending Tags for Images: Deep Learning Approaches for Personalized Tag Recommendation / Thi Hong Hanh Nguyen." Hildesheim : Universität Hildesheim, 2018. http://d-nb.info/1171987838/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Röhrborn, Axel. "Christian Gotthilf Tag Studien zu Leben und Werk." Stuttgart Ibidem-Verl, 2009. http://d-nb.info/993731996/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Paiu, Raluca. "Exploiting tag information for search and personalization." Hannover Technische Informationsbibliothek und Universitätsbibliothek Hannover, 2010. http://d-nb.info/1001050592/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Thadani, Prakash. "Local caching architecture for RFID tag resolution." Thesis, Wichita State University, 2007. http://hdl.handle.net/10057/1559.

Full text
Abstract:
Radio Frequency Identification (RFID) is set to become the standard in identification and tracking of items worldwide with projected numbers in tens of billions in a few years. With the reducing size and cost of RFID equipment, the use of RFIDs is being pushed well beyond just replacement of barcodes. Even though the deployment of RFIDs is growing at an exponential rate, the only global standard that currently exists for RFID networks is the EPCglobal Network proposed by EPCglobal, Inc. This thesis reviews the EPCglobal Network Architecture and provides a detailed explanation and critique of the proposed framework. Although this architecture has been designed as a very robust and scalable architecture, there are some limitations related to delay and reliability. The thesis proposes an enhancement to the EPCglobal Architecture to mitigate these issues. The new architecture suggests that RFID users maintain a local database that synchronizes with the Master database, so that under certain conditions, data can be retrieved locally instead of going over the network for identification of every single item. The thesis compares the two architectures using a cost function analysis. Also, as a means to showcase the advantages of the proposed enhancement as well as to enable future users and researchers to have access to a RFID test environment, a complete, scalable RFID simulator has been built from the ground up. The results show that the proposed solution demonstrates distinct performance improvements over the original architecture and also increases the reliability of the system.<br>Thesis (M.S)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering<br>"December 2007."
APA, Harvard, Vancouver, ISO, and other styles
21

Hales, David. "Tag based co-operation in artificial societies." Thesis, University of Essex, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.340588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Meunier, Frédéric. "Implantation du formalisme de génération G-TAG." Paris 7, 1997. http://www.theses.fr/1997PA077252.

Full text
Abstract:
Cette étude concerne l'implantation de G-TAG, un formalisme de génération de textes multilingues inspiré des grammaires d'arbres adjoints (TAG). Bien que les grammaires d'arbres adjoints soient légèrement sémantiques, elles ne répondent pas aux exigences de la génération de textes. Il a donc fallu implémenter conjointement le formalisme G-TAG et un formalisme de représentation des connaissances, inspiré d'une logique typée du premier ordre. L'implantation de ces formalismes nous a amené à établir leurs cahiers des charges respectifs de manière rigoureuse. Ces deux cahiers des charges sont présentés de façon précise et détaillée dans cette étude. De plus, nous voulions offrir une plate-forme d'études et de développements aux linguistes spécialisés en génération de textes. Nous montrons donc quelle architecture donner à un système informatique, pour permettre au linguiste de se débarrasser des contraintes informatiques, afin de se concentrer sur les problèmes propres à la génération. Ainsi, le linguiste décrit les données dans le formalisme G-TAG, non dans un langage informatique, ce qui est souvent le cas des systèmes d'ingénierie linguistique. Enfin, puisque G-TAG est un formalisme, son implantation, Flaubert, peut être considérée comme un générateur de textes générique, que le linguiste instancie à sa guise en décrivant les bases linguistiques spécifiques de chaque domaine de génération. Pour preuve, Flaubert a déjà donné naissance à trois générateurs : génération en français et en anglais de manuels d'utilisation de logiciel ; génération en français et en anglais de légendes de photographie de football ; génération en français de documents de maintenance d'hélicoptère
APA, Harvard, Vancouver, ISO, and other styles
23

Saini, Navtej Singh. "UHF RFID Sensor Tag for Tire Monitoring." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1480629684843769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Thadani, Prakash Pendse Ravindra. "Local caching architecture for RFID tag resolution /." Thesis, A link to full text of this thesis in SOAR, 2007. http://hdl.handle.net/10057/1559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

MEDEIROS, Ícaro Rafael da Silva. "Tag suggestion using multiple sources of knowledge." Universidade Federal de Pernambuco, 2010. https://repositorio.ufpe.br/handle/123456789/2275.

Full text
Abstract:
Made available in DSpace on 2014-06-12T15:56:06Z (GMT). No. of bitstreams: 2 arquivo2739_1.pdf: 2586871 bytes, checksum: 3a0e10a22b131714039f0e8ffe875d80 (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2010<br>Nos sistemas de tagging social usuários atribuem tags (palavras-chave) a recursos (páginas Web, fotos, publicações, etc), criando uma estrutura conhecida como folksonomia, que possibilita uma melhora na navegação, organização e recuperação de informação. Atualmente, esses sistemas são muito populares na Web, portanto, melhorar sua qualidade e automatizar o processo de atribuição de tags é uma tarefa importante. Neste trabalho é proposto um sistema que automaticamente atribui tags a páginas, baseando-se em múltiplas fontes de conhecimento como o conteúdo textual, estrutura de hiperlinks e bases de conhecimento. A partir dessas fontes, vários atributos são extraídos para construir um classificador que decide que termos devem ser sugeridos como tag. Experimentos usando um dataset com tags e páginas extraídas do Delicious, um importante sistema de tagging social, mostram que nossos métodos obtém bons resultados de precisão e cobertura, quando comparado com tags sugeridas por usuários. Além disso, uma comparação com trabalhos relacionados mostra que nosso sistema tem uma qualidade de sugestão comparável a abordagens estado da arte na área. Finalmente, uma avaliação com usuários foi feita para simular um ambiente real, o que também produziu bons resultados
APA, Harvard, Vancouver, ISO, and other styles
26

Takahashi, Mariko. "A Comparative Study of Tag Questions and Invariant Tags in Asian Englishes: A Corpus-Based Analysis." Kyoto University, 2016. http://hdl.handle.net/2433/215623.

Full text
Abstract:
Kyoto University (京都大学)<br>0048<br>新制・課程博士<br>博士(人間・環境学)<br>甲第19797号<br>人博第768号<br>新制||人||185(附属図書館)<br>27||人博||768(吉田南総合図書館)<br>32833<br>京都大学大学院人間・環境学研究科共生人間学専攻<br>(主査)教授 齋藤 治之, 教授 壇辻 正剛, 准教授 谷口 一美<br>学位規則第4条第1項該当
APA, Harvard, Vancouver, ISO, and other styles
27

Berti, Federico. "RFID tag localization with virtual multi-antenna systems." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/9753/.

Full text
Abstract:
In questa tesi si sono valutate le prestazioni di un sistema di localizzazione multi-antenna di tag radio frequency identification (RFID) passivi in ambiente indoor. Il sistema, composto da un reader in movimento che percorre una traiettoria nota, ha come obiettivo localizzare il tag attraverso misure di fase; più precisamente la differenza di fase tra il segnale di interrogazione, emesso dal reader, e il segnale ricevuto riflesso dal tag che è correlato alla distanza tra di essi. Dopo avere eseguito una ricerca sullo stato dell’arte di queste tecniche e aver derivato il criterio maximum likelihood (ML) del sistema si è proceduto a valutarne le prestazioni e come eventuali fattori agissero sul risultato di localizzazione attraverso simulazioni Matlab. Come ultimo passo si è proceduto a effettuare una campagna di misure, testando il sistema in un ambiente reale. Si sono confrontati i risultati di localizzazione di tutti gli algoritmi proposti quando il reader si muove su una traiettoria rettilinea e su una traiettoria angolare, cercando di capire come migliorare i risultati.
APA, Harvard, Vancouver, ISO, and other styles
28

Farneti, Thomas. "Tecnologie RFId: dal tag ai sistemi back-end." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/6099/.

Full text
Abstract:
I sistemi di identificazione tramite radiofrequenza hanno acquistato negli ultimi tempi una sempre maggiore importanza per il mondo produttivo, soprattutto nel settore della movimentazione delle merci, evolvendo verso applicazioni di tracciamento sempre più avanzate. La tesi si propone di analizzare in dettaglio la tecnologia RFId, chiarendone gli aspetti fondamentali ed esponendo criticità e punti di forza.
APA, Harvard, Vancouver, ISO, and other styles
29

JOE, MIJEOM. "Stage-Structured Tag-Return and Capture-Recapture Models." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20010412-160147.

Full text
Abstract:
<p><P> Ecologists and conservation biologists have had an increasing interest in landscapeecology, fragmentation and meta-population structures and dynamics for endangered or threatened species of wildlife (Nichols et al. 1992).They have realized the need for parameter estimates to use in the multi-state models;and have tried estimation of transitionprobabilities among stages using tag-return and capture-recapture models. Thesetransition probabilities are composed of survival and movement rates andcan only be estimated separately when an additional assumption is made(Brownie et al. 1993) that movement occurs at the end of theinterval between time + 1.We generalize this workto allow different movement patterns in the intervalfor multiple tag-recovery and capture-recapture experiments.<P><P> With methods of separating survival and movement rates in multi-state tag-return and capture-recapture models,we develop multi-state fishery tag return models with potential forfisheries that have multiple sites or patches with movement possible between sites. We build on models developed by Brownie et al. (1985), Pollock et al. (1991, 1995), Hoenig et al. (1998 a, b), and Hearn et al. (1998) on twice-a-year tagging for single state models.These methods allow the estimation of patch-specific natural and fishingmortality rates and movement rates between patches. <P><P> We then develop multi-state fishery tag-return and capture-recapture models with potential forfisheries that have multiple sites or patches withmovement possible between sites when taggingtakes place twice a year.These methods allow the estimation of patch-specific reporting, natural and fishing mortality rates, and movement rates between patcheswith movement time following a uniform distribution for two special cases: (1) a two-site tag-return fisheries model;(2) a two-site model with capture-recapture catch and releasesampling in a marine reserve closed to regular fishing and the more usual tag-return sampling in the fishery area, since marine reserves which provide a refuge from fishing are gaining in popularity as a tool of fisheries management, but their effectiveness needs to beevaluated. We present small simulation studies andcompare the Relative Bias and Relative Standard Errors (RES) of estimatesas well as the correlations between estimates.<P><P>
APA, Harvard, Vancouver, ISO, and other styles
30

Schwesig, Paul-Gerhard. "Die Rolle der Tag-JHWHs-Dichtungen im Dodekapropheton." Berlin New York de Gruyter, 2005. http://deposit.d-nb.de/cgi-bin/dokserv?id=2848367&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Mason, Joanne Sheri. "Fluorescent tag methodology in enzyme-catalysed oligosaccharide synthesis." Thesis, University of Warwick, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.342692.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Al-Adhami, Ayad. "A secure quorum based multi-tag RFID system." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/12821.

Full text
Abstract:
Radio Frequency Identification (RFID) technology has been expanded to be used in different fields that need automatic identifying and verifying of tagged objects without human intervention. RFID technology offers a great advantage in comparison with barcodes by providing accurate information, ease of use and reducing of labour cost. These advantages have been utilised by using passive RFID tags. Although RFID technology can enhance the efficiency of different RFID applications systems, researchers have reported issues regarding the use of RFID technology. These issues are making the technology vulnerable to many threats in terms of security and privacy. Different RFID solutions, based on different cryptography primitives, have been developed. Most of these protocols focus on the use of passive RFID tags. However, due to the computation feasibility in passive RFID tags, these tags might be vulnerable to some of the security and privacy threats. , e.g. unauthorised reader can read the information inside tags, illegitimate tags or cloned tags can be accessed by a reader. Moreover, most consideration of reserchers is focus on single tag authentication and mostly do not consider scenarios that need multi-tag such as supply chain management and healthcare management. Secret sharing schemes have been also proposed to overcome the key management problem in supply chain management. However, secret sharing schemes have some scalability limitations when applied with high numbers of RFID tags. This work is mainly focused on solving the problem of the security and privacy in multi-tag RFID based system. In this work firstly, we studied different RFID protocols such as symmetric key authentication protocols, authentication protocols based on elliptic curve cryptography, secret sharing schemes and multi-tag authentication protocols. Secondly, we consider the significant research into the mutual authentication of passive RFID tags. Therefore, a mutual authentication scheme that is based on zero-knowledge proof have been proposed . The main object of this work is to develop an ECC- RFID based system that enables multi-RFID tags to be authenticated with one reader by using different versions of ECC public key encryption schemes. The protocol are relied on using threshold cryptosystems that operate ECC to generate secret keys then distribute and stored secret keys among multi RFID tags. Finally, we provide performance measurement for the implementation of the proposed protocols.
APA, Harvard, Vancouver, ISO, and other styles
33

Lai, Peter (Peter J. ). "Facette : using facets to improve tag-based bookmarking." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/61303.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 51-52).<br>Facette is a web service that uses facets to enhance the organizational capabilities of tag-based bookmarking systems. As with other bookmarking services, Facette allows users to associate tags with bookmarks to assist the retrieval of information. Facette also allows users to classify tags through use of facets. To create these facets, Facette introduces a method of facet creation called free faceted tagging. To assist the classification of tags using facets, Facette extends the concept of collaborative tagging and introduces the concept of collaborative faceting. For ease of implementation, Facette is implemented as an augmentation of Delicious' tagging system. Faceted information is saved to Delicious through use of new tag syntax. Faceted information is retrieved from Delicious through use of Delicious's API. Since its public debut on February 16th, 2009, Facette has successfully assisted the use of faceted tagging. Facette has been used by several hundred Delicious users. Facette's tagging interface has led to the bookmarking of thousands of pages with thousands of faceted tags. Overall, Facette has successfully encouraged the creation of faceted information.<br>by Peter Lai.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
34

Chuang, Tien-Jung, and 莊典融. "Enhancing Tag Recommendation by Tag Clustering." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/40503344873831957740.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊工程學研究所<br>97<br>In this paper, we design a method to define the degree of tag ambiguity, and clarify ambiguous tag by clustering it into different groups, each group contains an explicit concept. Furthermore, based on the vote strategy, we design an algorithm to detect the group that a tag belonging to in order to solve tag ambiguity. Besides, according to this concept, we provide a novel framework of tag recommendation system, insteading of finding relation between tag and tag, our new framework find relation between tag and tag cluster. By this method, we take issue of tag ambiguity into account and improve the recommendation result.
APA, Harvard, Vancouver, ISO, and other styles
35

Carnie, Andrew. "Tag Questions." 2009. http://hdl.handle.net/10150/604808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

詹天浩. "A hardware development platform for the Tag-itTM active sensor's RFID tag." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/41919277401767186840.

Full text
Abstract:
碩士<br>國立彰化師範大學<br>電子工程學系<br>95<br>The main theme of this thesis was the establishment of development platform for the active sensor’s RFID tag based on the Tag-it™ protocol and embedded system techniques. The RFID transmission technique simultaneously delivers the energy and operational command by the RF signals to activate the sensors on the tag, and then immediately receives the sensed data from that tag. The development platform extends the sensor interface on a traditional RFID tag that is helpful to applied to military, medical treatments, vehicles, logistics, entrance guard or tracking, aviation, anti-counterfeit, tracking, and payment. Otherwise, the development platform assisted the development of the smart sensors and wireless sensor networks on the RFID application domain. Specifically, the platform includes the decoder/encoder, a microprocessor, and analog signal interfaces that are integrated to explore the connection between the RFID tag and sensors, to transfer the prototype of the active sensor’s RFID tag into an SOC process, and to conveniently exemplify and optimize the functional modules of the active sensor’s RFID tag.
APA, Harvard, Vancouver, ISO, and other styles
37

HUANG, LIN-SIANG, and 黃麟翔. "Passive RFID Tag Design." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/x76e77.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電機工程系<br>99<br>In this study, the approach to design RF to DC and demodulator which both have 905MHz operation frequency is the process of the UMC 90 nm CMOS. The functions of those are to provide DC voltage and demodulate signal in the structure of Passive RFID Tag application. Through the simulation, the minimum input power, output voltage, and the maximum power efficiency are -10 dBm, 1.08 V, and 4.9% respectively. The measurements of the chip, which sizes 0.46×0.52 mm^2, are -10 dBm, 1.08 V, and 1%. Moreover, the range of the data rate is 16.6 Kbps to 25 Kbps. TSMC 0.18um CMOS process is use to accomplish 905 MHz Passive RFID Tag. To enhance the power efficiency, the property of zero threshold voltage of native CMOS device is used to establish the three-stage charge pump as the core of the RF to DC. The minimum input power, output voltage, and the maximum power efficiency of the tag’s RF to DC are -20 dBm, 0.59V, and 26.7% respectively. In additionally, the measurements of the chip, which area is 0.52×0.62mm^2, are -1dBm, 0.7 V, and 0.49%.
APA, Harvard, Vancouver, ISO, and other styles
38

Jain, Amit. "Athena - RFID tag metrics." 2009. http://hdl.handle.net/10106/2095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Sumner, MD. "The tag location problem." Thesis, 2011. https://eprints.utas.edu.au/12273/3/sumner.pdf.

Full text
Abstract:
This thesis provides an integrated approach to common problems with location estimation for animal tracking. Many existing techniques confound problems of location accuracy with simplistic track representations and under-utilization of available data. Traditional techniques such as speed ltering and time spent maps are illustrated with a software package developed by the author with examples of location estimates from southern elephant seals. This software enables the application and exploration of various techniques that have previously not been available in a single solution. These include ltering, temporal gridding, projection transformation and GIS integration. A novel Bayesian approach is introduced for the more general problems faced by dierent tagging techniques. This approach integrates all sources of data including movement models, environmental data and prior knowledge. This general framework is illustrated by application to satellite tag data and light-measuring tag data. Examples are used to detail the use of movement models with a powerful track representation model, and the application of raw light data for location estimation. Previously under-utilized sources of data are used to inform location estimates. A method for applying light level geo-location within the framework is presented. This approach provides a primary location estimate for each twilight and utilizes all of the available data from archival tags. These model runs result in very large databases of samples from Markov Chain Monte Carlo (MCMC) simulations and techniques for summarizing these for the variety of analysis outputs are illustrated. This system solves issues of location uncertainty with a full path representation and provides spatial maps of residency for multiple animals. The relation between archival tag data and ocean circulation is used to extend the application of archival tag data for location estimation for diving animals in a manner similar to commonly used SST methods. Diving proles from elephants seals are compared with 4D oceanographic datasets. Older tags are limited by problems with measurement lags for temperature|this problem is addressed with a proxy model for temperature at depth to ocean height. This thesis provides a number of important improvements to the derivation of location from various types of tag data by integrating disparate information sources in a systematic way. Location estimates are produced with inherent quantication of errors. The approach provides the variety of metrics and analysis types required with an extensible software package. These contributions help bridge the divides between various analytic techniques traditionally employed for animal tracking.
APA, Harvard, Vancouver, ISO, and other styles
40

Li, Cai-Lun, and 李采倫. "Tag Questions in Mandarin Chinese." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/78108123160557156578.

Full text
Abstract:
碩士<br>國立政治大學<br>語言學研究所<br>86<br>Tag questions have never been a hot issue among linguists studying questions in Mandarin Chinese. According to previous analyses, since tag questions are merely instances of A-not-A or yes-no questions with sentential subjects or topics, there is no need to recognize a separate category for Mandarin tag questions. In this thesis, it is shown that the underlying form and pragmatic functions of Mandarin tag questions are not so simple and should not be ignored in that way.   Based on our syntactic analysis, the underlying structure of Mandarin tag questions is divided into two subparts, and each performs various syntactic behavior. One is the structure of simple A-not-A or yes-no questions with sentential subjects or topics and the other is the construction of coordination. The former can serve as the subject or direct object of a verb while the latter cannot.   To interpret the complicated relationship between form and function of the Mandarin tag question, a pragmatic analysis is moreover proposed. Based on various illocutionary intents and speaer's psychological states, tag questions are divided into two major kinds to perform different illocutionary acts:'Question'and'Request'(including request for confirmation and for action). After relating our syntactic approach to pragmatic analysis, it is manifest that the interaction between underlying form and pragmatic functions results in the surface structure of Mandarin tag questions.
APA, Harvard, Vancouver, ISO, and other styles
41

Chiuan, Chang Chia, and 張家銓. "Design of RFID Tag Chip." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/53529345138664861697.

Full text
Abstract:
碩士<br>中華大學<br>電機工程學系碩士班<br>92<br>This thesis is about the circuit design of the Tag part in the Radio Frequency Identification (RFID) system and the basic function of Tag. The design procedures include the simulation of digital software and functions; the next is the design of the basic logic gates and analog circuits and the last one is the considerations for IC layout.The first part of the thesis includes the introduction, the planning of the RFIDsystem, the formation and formulation of the specification of RFID system, and the second part focuses on chip design, measurement, and the conclusion of the thesis. The preliminary designed functions of the circuit is: being the Schmitt trigger Clock using the capacitance to be a frequency buffer, being the error detective code of CRC-16, being the Manchester code and making rectification, oscillation, and modulation through single circuit. Finally, this IC design is complete.
APA, Harvard, Vancouver, ISO, and other styles
42

Lee, Ming-Yan, and 李明諺. "Reuse Mechanisms for RFID Tag." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/82530552869206007219.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊管理研究所<br>93<br>There are many applications with Radio Frequency Identification (RFID), and it is the solution to replace the barcode. Because of the features of RFID, many people emphasis the issues about security and privacy. After Wal-Mart proceed “Smart-Sheft” testing, Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN) worried that merchants or manufacturers were able to trace the product which had sold. Although the manufacturers of RFID chips announced that they would embed “Kill”or “Sleep”function in chips, there were other problems. Thus, how to make RFID Tag reuse and ensure privacy is the focus of this dissertation. After reviewing the issues about RFID Tag reuse and privacy, the main point is that RFID Tag keepers worry about leaking information. If no reuse of RFID Tag, that will make RFID lose edges. Thus, this dissertation purposes two mechanisms of RFID Tag reuse that make Tag be reused and provide privacy protection. Mechanism 1 requires shorter computing time and less cost of tags. Mechanism 2 provides higher security when attackers knew the secret key, but it would spend more computing time. There are different advantages for two mechanisms, and which points to the conclusion that we may use one of two mechanisms according to the factors which we consider.
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Ming-hsiang, and 李明翔. "MIMO UHF Passive RFID Tag." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/04760303539379187919.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電機工程系<br>103<br>Due to the long read range, the performance of Ultra High Frequency (UHF) Identification (RFID) system can be easily affected by multi-path fading. To overcome the preceding problem, a MIMO UHF passive RFID tag, operating at 925 MHz, complied with the regulation of Taiwan, is proposed in this thesis. With different polarizations of transmitter, we measure the tag backscatter power .The experimental results verify the effects of tag against multi-path fading. The structure of the dual antenna tag is referred to the structure of analog front-end circuit of Wireless Identification and Sensing Platform (WISP) and the  semi-passive dual antenna tag design in Lin’s thesis and optimized becoming a passive dual antenna tag. Furthermore, we add the quantization function of Received Signal Strength Indicator (RSSI) on MSP430. Thus, the quantized values can be transmitted to receiver by Space-Time Block Code, STBC. In addition, because of the difference pattern of backscatter of the improving tag, compared with tag proposed by previous literature, the reader we used before is not available to analyze the data. Therefore, the effects are verified by measuring, observing and analyzing the energy variation.
APA, Harvard, Vancouver, ISO, and other styles
44

Santos, Joaquim Filipe Peixoto dos. "Understanding and evolving tag usefulness." Doctoral thesis, 2017. http://hdl.handle.net/10348/7657.

Full text
Abstract:
Tese de Doutoramento em Informática<br>O Turismo é do ponto de vista global, uma das áreas da economia com maior crescimento, mas o surgimento de novas geografias com novos atrativos coloca desafios importantes, implicando que os destinos tradicionais inovem, tornando-se apelativos para outras faixas da população que todos os anos adquirem capacidade económica para viajar. Uma das formas mais eficaz de responder a estes desafios é procurar conhecer melhor quem nos visita, traçando os seus perfis individuais com informação o mais adequada e diversificada possível, seja ela de cariz físico, intelectual, gostos individuais, similaridade com outros, etc. A modelação de um utilizador como entidade única e individual é, normalmente, pobre e claramente rudimentar, quer nos métodos, quer no alcance dessa mesma modelação, porque uma parte significativa da informação disponível não é processada e utilizada, de forma a permitir um conhecimento mais correto de cada um. Para além de pobre e rudimentar, a modelação do utilizador dedica pouca importância a questões fulcrais, como sejam as limitações de cariz físico e/ou mental que cada indivíduo possui e que muitas vezes são fatores inibidores das atividades que cada um pode levar a cabo. A deficiência ou limitação caracteriza-se como uma alteração biomédica significativa na estrutura ou funções físicas e psicológicas do corpo humano, em relação a um padrão de normalidade, mas a ocorrência destas não deve determinar imediatamente uma incapacidade, pois pode ser possível encontrar alternativas válidas para que seja possível a um determinado indivíduo viver determinada experiência, independentemente das suas limitações. A incapacidade é a junção de uma deficiência com um determinado ambiente que pelas suas características propicia o condicionamento do indivíduo, logo não é uma inevitabilidade. Os Sistemas de Recomendação para Turismo podem desempenhar um papel fundamental na melhoria das experiências dos utilizadores e, consequentemente, na perceção que estes adquirem de determinada localização (baseando os seus resultados em conhecimento, quer dos utilizadores, quer dos locais que lhes permitam efetuar sugestões que evitem ou pelo menos minimizem a possibilidade de uma limitação se tornar numa incapacidade durante as visitas turísticas). Neste trabalho, e com base na metodologia de investigação Design Science Research, é proposta uma arquitetura e desenvolvido um protótipo de Sistemas de Recomendação Turística, onde utilizadores são modelados com novos tipos de informação para além da tradicional, como sejam os seus níveis de funcionalidade em termos de um conjunto de patologias e limitações de cariz físico e intelectual. Os pontos de interesse são também modelados com a mesma estrutura de informação, nomeadamente, no caso das patologias, permitindo, dessa forma, definir o seu nível de acessibilidade.<br>Tourism is in a global perspective, one of the most fast growing areas in the economy, but the appearance of new offers in different geographies with new attractions creates important challenges to the traditional destinations that needs to evolve and turn themselves the best option for large groups of world population that every year gain the capacity to travel. One of the most effective ways to respond to these challenges is to seek better knowledge about our visitors, tracing their individual profiles with the most appropriate and diverse information, like physical and intellectual issues, personal tastes, similarity with others, etc. The modelling of a user as a unique and individual entity is usually poor and clearly rudimentary either in the methods or in the scope because a significant part of the available information is not processed and used in order to allow a more correct knowledge of each one. In addition to poor and rudimentary traditional user modelling approaches devotes low attention to key issues such as the physical and/or mental limitations of the each one has and which often these are inhibiting factors of the activities that each one can carry out. Limitations or impairments are characterized as a significant biomedical change in the structure or physical and psychological functions of the human body, compared to a normal pattern, but the occurrence of these should not immediately determine a disability, it may be possible to find valid alternatives to became possible for an individual to live certain experience, regardless of their physical or mental state. Disability is the addition of a deficiency with a certain environment whose characteristics provide the individual conditioning, so it's not inevitable. Tourism Recommender Systems for can play a key role in improving the user’s experiences and consequently the perception that they acquire of a certain location, if the results can be based in user and POI related knowledge that allow them to make suggestions capable of avoiding or at least minimize the appearance of disabilities during sightseeing. In this study based on the Design Science Research research methodology, an architecture is proposed and a Touristic Recommendation system prototype is developed where users are modelled with new types of information in addition to traditional approaches such as their levels of functionality regarding a set of physical and intellectual issues. POI are also modelled with the same information structure particularly in the case of diseases thereby allowing define their accessibility level.
APA, Harvard, Vancouver, ISO, and other styles
45

Gill, HK. "Abalone tag detection and recognition." Thesis, 2009. https://eprints.utas.edu.au/19912/1/whole_GillHarpreetKaur2009_thesis.pdf.

Full text
Abstract:
In recent years, there have been serious concerns about the declining stocks of wild abalone combined with a rapidly increasing market demand and so aquaculture researchers are continuously investing in new methods for growing and monitoring cultured abalone. There are a number of new programs that have been planned for farmed abalone, such as selective breeding and genetic manipulation to meet world demand. These methods can only be successful if abalone traits and behaviour can be identified properly. Therefore, physical tagging of abalone shells and DNA (Deoxyribonucleic Acid) pedigree markers have been developed to enable tracking and tracing of individuals. Researchers are continually finding more effective methods of physical tagging so that tags can be visualised more readily and will be retained on the abalone shell for a longer period of time. Identifying the tag and character information is also time and labour intensive. Therefore, automated image analysis of abalone tags may provide a solution for tracking abalone and for identifying abalone behaviour and pedigree information. After reviewing the broad field of computer vision, an image processing system was developed in MATLAB using appropriate image analysis and processing techniques, to automate the process of extracting sub-images of physical tags attached to the abalone shells, in preparation for input to an optical character recognition system, which would read the tags on the shells. The image processing system developed was able to successfully identify a number of tags from digital images directly taken from land-based tanks on various abalone farms; tag colour and character recognition was achieved. In addition, this research will help aquaculture researchers to study abalone movement, behaviour and performance traits in a cultured environment.
APA, Harvard, Vancouver, ISO, and other styles
46

He, Jyun-Yan, and 何駿彥. "RFID Tag Anti-Collision Protocols." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/83672538755202151961.

Full text
Abstract:
碩士<br>國立東華大學<br>資訊工程學系<br>99<br>Radio frequency identification (RFID) system consists of radio tags, readers, and the backend database system that associates RFID tag data collected by readers for verification or special need. A Reader communicates with tags at distance through wireless transmission. Many manufacturers see the intended applications of RFID technology, and deploy RFID in inventory control, distribution industry and supply chain management. As far, there are already many concrete applications using RFID, e.g., inventory control, distribution industry and supply chain management. However, a so-called tag collision problem in RFID system happen when multiple tags respond to a reader simultaneously and the reader cannot differentiate these tags correctly. Tag collisions will degrade identification efficiency, and this unreliable identification compromises the usefulness of RFID system. There are two major types of anti-collision protocols. One is ALOHA-based protocol and the other is tree-based protocol. ALOHA-based protocol reduces the tag collisions, while it has the starvation problem (a tag cannot be identified for a long time). To address such problem, two tree-based protocols- binary tree (BT) protocol and the query tree (QT) protocol- were accordingly proposed. In this thesis, we propose two QT based protocols. Recently, a RN16QT was proposed, which used a RN16 random number as the temporary ID of tag. It successfully reduces the time consumption for tag identification. However, the tag collision still occurs due to the short length of RN16. We propose an effective RN16QT (ERN16QT) to enhance RN16QTA. Our ERN16QT can also address the similar EPC. A ternary tree is impossible in QT protocol, but it brings about the optimum performance for tag identification. We propose a practical ternary QT protocol to efficiently identify a binary EPC.
APA, Harvard, Vancouver, ISO, and other styles
47

"The Impact of Working Memory, Tags, and Tag Clouds, on Search of Websites." Master's thesis, 2011. http://hdl.handle.net/2286/R.I.9435.

Full text
Abstract:
abstract: Although there are many forms of organization on the Web, one of the most prominent ways to organize web content and websites are tags. Tags are keywords or terms that are assigned to a specific piece of content in order to help users understand the common relationships between pieces of content. Tags can either be assigned by an algorithm, the author, or the community. These tags can also be organized into tag clouds, which are visual representations of the structure and organization contained implicitly within these tags. Importantly, little is known on how we use these different tagging structures to understand the content and structure of a given site. This project examines 2 different characteristics of tagging structures: font size and spatial orientation. In order to examine how these different characteristics might interact with individual differences in attentional control, a measure of working memory capacity (WMC) was included. The results showed that spatial relationships affect how well users understand the structure of a website. WMC was not shown to have any significant effect; neither was varying the font size. These results should better inform how tags and tag clouds are used on the Web, and also provide an estimation of what properties to include when designing and implementing a tag cloud on a website.<br>Dissertation/Thesis<br>M.S. Applied Psychology 2011
APA, Harvard, Vancouver, ISO, and other styles
48

Yu-MinHu and 胡育銘. "Re-entering Tag Collision Prevention and Overlapping Staying Tag Identification in RFID Systems of IoT." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/66990112625679634420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Wu, Chun-te, and 吳俊德. "Design of Tag Search Algorithm and Tag Chip with Auto-ID Center Class-1 Generation 1." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/cqjt34.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電機工程系<br>94<br>Radio Frequency Identification (RFID) systems have become one of the most popular technologies recently. It can replace the traditional role of bar code system in the supply or service chain by reducing the needs of manpower. In this thesis, we first carry out a tag module by Verilog HDL that complied with Auto-ID Center Class-1 Standard. Then, a fully tag search algorithm is designed to work in a simple RFID reader to find out all the tags coexisting in the field of the RFID reader. This search algorithm queries the tags for identification information efficiently. It can identify up to six hundred tags in eight seconds. Finally, we propose two modifications about the original architecture and focus our attention on how to further reduce the use of logic gate to efficiently improve search performance. According to our experimental results, the modified architecture achieves 200% improvement over the original standard.
APA, Harvard, Vancouver, ISO, and other styles
50

Sun, Jianzhong. "Power management for a biotelemetry tag." Thesis, 2004. http://hdl.handle.net/2429/15778.

Full text
Abstract:
Power management for a biotelemetry tag implanted into the body of a sealion with the body temperature around 40°C is proposed in the aim for sustaining the tag's operation for at least three years without changing power sources under the constraint of a bounded energy budget and low physical profiles of all electronic components. Various primary battery and capacitor technologies and converter topologies are studied and compared. Two types of commercially available batteries, a silver oxide battery and a lithium manganese dioxide battery, are discharged at several constant current levels and at two different temperatures to establish the Peukert equation with temperature dependence for each type of battery technology, I[sup n] x t = K[sub 0] ( 1 + α T). It is concluded that a silver oxide battery is a better battery technology in that it has a more flat discharge profile and can deliver higher power and energy when they are normalized (with respect to nominal power and energy), than lithium manganese dioxide battery does. The supercapacitor in parallel with battery cells is incorporated into the input power source to enhance the power capability required by electronic components when the battery cells alone cannot supply such high power. The supercapacitor is adopted for its highest volumetric efficiency among all capacitor technologies and relatively low leakage current, which is measured at 40°C and confirmed to be well under 0.5 μ A. A converter topology is necessary to meet different voltage requirements from all electronic components. For maximum simplicity, a converter topology using two silver oxide batteries in series producing an input voltage of 3V can involve only one boost converter in the topology based upon the unique characteristics of a silver oxide battery from test results. A commercially available compact boost converter including the battery stacks in parallel with the supercapacitor as the input power source is tested under the voltage and current requirement of a power amplifier. The result shows that the chosen boost converter can meet the input power requirement of the power amplifier. It is concluded that under the constraint of current energy budget the proposed converter topology will operate for at most 6 years with the duration between adjacent activations for a low noise amplifier to be 46 minutes.<br>Applied Science, Faculty of<br>Electrical and Computer Engineering, Department of<br>Graduate
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography