Siga este enlace para ver otros tipos de publicaciones sobre el tema: Door locks.

Tesis sobre el tema "Door locks"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 32 mejores tesis para su investigación sobre el tema "Door locks".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Samuel, David. "RFID security in door locks". Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.

Texto completo
Resumen

Radio frequency identification, RFID is a technology that is used in many fields including locks. The unlimited access to the reader and the transponder has resulted in severe security weaknesses and made it possible to apply different attacks. To classify door locks as secure they must at least fulfil two main criteria: the first is the use of a challenge-response authentication protocol and the second is to deploy sophisticated and secure algorithms.

MiFare classic and KeeLoq are two widely applied technologies that are still in use in many security critical applications and are considered to be secure but which have been broken by cryptanalysis and with modest efforts and cost.

How secure a certain solution is depends on how expensive it is to buy the equipment that can break the system and reveal the secret key and how secure a lock should be depends on the value of what it is protecting.

The dropping price of powerful computers and the availability of security related information on the web will lead to an increase of the number of attacks on different systems.

By the time this thesis is published those locks evaluated are not secure enough, to overcome the security shortage some improvements have to be made such as: the use of sophisticated algorithms, the use of longer key of at least 128-bit, the use of non-deterministic random number generators and the use of pure hardware solutions both in the receiver and the transmitter to reduce leakage.

Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Viderberg, Arvid. "Security evaluation of smart door locks". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254962.

Texto completo
Resumen
Smart locks are a part of the up and rising Internet of Things (IoT). They’re used as a complement to traditional locks in order to make it easier to share keys electronically, rather than physically. Smart door locks are mounted on a existing door and enables users to control the state of the lock with their smartphone. In this report we want to investigate if previous acknowledged attacks on smart locks still exists in today’s available locks for the Swedish market. By studying previous work and conduct a threat model, we create attacks to apply on the locks in order to answer what deficiencies exist in smart door locks today.The results conclude that there are several deficiencies in today’s smart locks, where the most severe has been reported under responsible disclosure to the manufacturer. The locks investigated shows vulnerabilities in state consistency, password policies and password reset mechanism.
Smarta lås är en del av sakernas internet (IoT). Smarta lås används som ett komplement till traditionella lås för att göra det enklare att dela nycklar elektroniskt. Smarta dörrlås monteras på befintlig dörr och gör det möjligt för användare att styra låset med sin smartphone. I den här rapporten vill vi undersöka om tidigare kända attacker på smarta lås fortfarande finns i dagens tillgängliga lås på svenska marknaden. Genom att studera tidigare arbete och genomföra en hotmodell skapar vi attacker för att applicera på låsen, för att kunna svara på vilka brister som finns i smarta dörrlås idag. Resultatet drar slutsatsen att det finns flera brister i dagens smarta lås, där de allvarligaste har rapporterats till tillverkaren. De undersökta låsen visar sårbarhet i konsistens mellan tillstånd, lösenordspolicys och lösenordsåterställning.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Andersson, Tim. "Bluetooth Low Energy and Smartphones for Proximity-Based Automatic Door Locks". Thesis, Linköpings universitet, Interaktiva och kognitiva system, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107332.

Texto completo
Resumen
Bluetooth Low Energy is becoming increasingly popular in mobile applications due to the possibility of using it for proximity data. Proximity can be estimated by measuring the strength of the Bluetooth signal, and actions can then be performed based on a user's proximity to a certain location or object. One of the most interesting applications of proximity information is automating common tasks; this paper evaluates Bluetooth Low Energy in the context of using smartphones to automatically unlock a door when a user approaches the door. Measurements were performed to determine signal strength reliability, energy consumption and connection latency. The results show that Bluetooth Low Energy is a suitable technology for proximity-based door locks despite the large variance in signal strength.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Sopi, Jeton. "NFC Door Lock". Thesis, Högskolan i Halmstad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30306.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

ANDERSSON, FILIP y DAVID BERGLING. "Knock-Knock Door Lock : Unlocking your door with a secret knock sequence". Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279814.

Texto completo
Resumen
The door lock - a key function in every modern home, as well as a product which is today undergoing drastic change. The digital revolution has not left the door lock untouched, and there is today a wide variety of digital door locks utilizing technologies ranging from touch displays to fingerprint readers. The premises of the project was to try a different approach to the digital door lock and implement it schoolyard-style using a secret knock sequence, set by the user. The secret sequence would consist of two elements, both a rhythmical and a positional pattern. To unlock the door, the user would therefore need to simultaneously knock the correct rhythm and knock at the correct positions. To record and analyze the knock vibrations, piezo electric sensors connected to an Arduino Uno were used. To unlock the door, a small servo motor, two gears and a timing belt were used to turn the lock turning knob . Despite a short time frame and hardships due to the limitations caused by the coronavirus outbreak, a fully functional prototype which fulfilled both reliability and consistency was achieved. It could with good consistency recognize the test sequence, which was the intro rhythm to ”We Will Rock You” knocked in a square pattern. But even with flawless functionality, the conclusion would have been the same. The security of the system may be exceptional from a technical perspective, but it falls flat when the human factor is taken into account. The ability for a potential burglar to simply watch as one executes the secret knock is too much of a security hazard for the system to ever be considered as a competitor to other alternatives. The usage of the system is therefore better suited for applications where the thrill of using the product is more important than the actual security of it.
Dörrlåset - en grundläggande funktion i varje modernt hem, och samtidigt en produkt som idag genomgår drastisk förändring. Som resultat av den digitala revolutionen finns det idag en uppsjö av olika digitala dörrlås som utnyttjar allt från touchskärmar till fingeravtrycksläsare. Syftet med projektet var att testa en annorlunda tappning på det digitala dörrlåset, och förverkliga något många hade drömt om i barndomen - ett dörrlås aktiverat genom ett eget hemligt knackningsmönster. Det hemliga knackningsmönstret skulle då bestå av både ett rytmiskt och ett positionellt mönster. Därmed skulle den som ville öppna dörren behöva knacka både rätt rytm, och på rätt ställen på dörren. För att spela in och analysera vibrationerna från knackningarna användes piezoelektriska sensorer kopplade till en Arduino Uno. Mekanismen som styrde själva upplåsningen bestod av en liten servomotor, två kugghjul och en kuggrem som kopplade samman det hela. Trots en begränsad tidsram och motgångar orsakade av coronaviruset lyckades en fullt fungerande prototyp med hög pålitlighet färdigställas. Den kunde med hög tillförlitlighet känns igen testsekvensen, som var introrytmen till ”We Will Rock You” knackat i mönstret av en kvadrat. Men även med felfri prestanda hade slutsatsen varit densamma. Säkerheten för systemet må vara exeptionell ur ett rent tekniskt perspektiv, men den faller platt när den mänskliga faktorn tas med i beräkningen. Risken att en potentiell inbrottstjuv helt enkelt tittar på när någon knackar det hemliga mönstret är för stor för att systemet någonsin skulle kunna betraktas som en seriös konkurrent till andra digitala dörrlås. Produkten är därmed bäst lämpad för användningsområden där nöjet av att använda den är av högre prioritet än själva säkerheten.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Petersson, Linus. "Peer-to-peer : time to lock the door". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1724.

Texto completo
Resumen
Is a regulating policy concerning peer-to-peer applications required so that companies and institutions can better manage the security issues of internal peer-to-peer applications? There is high security and privacy risks involved when using p2p applications like KaZaA, Bearshare, Audiogalaxy and ICQ. With the high speed networks of today it is very important to really know what is going on in your network and which applications is doing what and with whom. If not, there are high possibilities that your system will be used for more or less malicious purposes. Therefore it is interesting to find out if p2p applications have found their way behind company walls. A policy can prevent the issues discussed either by banning employees from using p2p applications or by regulate the use of these applications in a very detailed manner. The implementation of a policy makes the usage controlled and easily supervised by the company security staff. Implementing a policy that regulates the use of p2p applications can prevent possible attacks on the company/organisation network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Almosawi, Massar y Kristoffer Djupsjö. "IoT Security Applied on a Smart Door Lock Application". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230153.

Texto completo
Resumen
This thesis describes the development of an IOT application based upon Digitizing a smart door lock for making it connected to the internet and able to recognize employees that work in the office. This thesis concentrates primarily on the security aspects by listing the typical security challenges in IOT systems in general and summing these challenges up to develop a functional and secure product from scratch. A microcontroller is chosen for this project and a test environment is built to experiment and develop the security breaches. Architectural designs are chosen for the API being developed and even for the Android Application. A detailed description is made of the multi-master database represented by Azure active directory and its importance to achieving the security of an essential security breach. A new technique called Eddystone is introduced in the project to serve the transmission protocol with Bluetooth beacons. The final stage of this project is completing the development of the Android application and making sure that all the subsystems developed do communicate with each other, to deliver a functional and secure flow of the IoT system.
Följande examensarbete beskriver utvecklingen av en IoT-produkt baserad på digitalisering av ett smart dörrlås där applikationen ansluts till internet för igenkänning av anställda som arbetar på ett kontor. Examensarbetet fokuserar primärt på säkerhetsaspekterna genom att notera de typiska säkerhetsutmaningarna som generella IOT-system utsätts för och summerar dessa utmaningar för att utveckla en funktionell och säker produkt från start av projektet. En mikrokontroller väljs ut specifikt för projektet och en testmiljö byggs för att undersöka och motverka eventuella säkerhetsbrister. Rapporten ger även detaljerad beskrivning av multi-master databasen Azure Active Directory och dess betydelse för att uppnå önskad säkerheten i systemet. En ny teknik som heter Eddystone introduceras i projektet för att betjäna som överföringsprotokoll till Bluetooth-beacons. Det sista steget i detta projekt kompletteras utvecklingen av systemet med Androidapplikation som ser till att alla utvecklade delsystem kommunicerar med varandra och levererar ett funktionellt och säkert flöde av IOT-systemet.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Karim, Rafid y Haidara Al-Fakhri. "Smart Door Lock : A first prototype of a networked power lock controller with an NFC interface". Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134894.

Texto completo
Resumen
Most major cell phone manufacturers have been releasing cell phones equipped with Near Field Communication (NFC). At the same time there is also increasing use of mobile payments and user verification with the use of the NFC technology. These trends indicate both the increasing popularity and great potential for increased use of NFC in today’s society. As a result NFC has a huge potential to simplify our everyday tasks, ranging from paying for items to accessing our office or home. In this context we will focus on using NFC together with a Power over Ethernet (PoE) powered circuit board and NFC reader to realize a simple system for granting access to open a locked door. One of the purposes of this realization is to explore what services can be realized when such a system is connected to the home/building network and connected to the Internet. A second purpose is to learn how to use network attached devices, as the concept of the Internet of Things is considered by many to be a driving force in the next generation Internet. This project uses very in expensive and low power hardware, as the number of devices is potentially very large and thus in order to minimize the technology’s impact on the environment we must consider how to minimize the power used – while maintaining the desired user functionality. This bachelor’s thesis project made it possible for a PoE powered circuit board containing a MSP430 microcontroller to work along with a NFC reader, which was connected through the Serial Peripheral Interface (SPI). We hope that the end result of this project will lead to a simpler life by exploiting this increasingly ubiquitous technology. For example, a homeowner could send a one-time key to a repair person who is coming to fix their sink. Similarly a homeowner could send a key to their neighbor which is valid for two weeks so that their neighbor could come into their home to water the plants while they are away on vacation. Another example is lending your apartment key to a friend while you are out of town.
Det blir allt vanligare med närfältskommunikation (NFC) i dagens samhälle, mobiltelefons-tillverkarna börjar utveckla nya telefoner med NFC teknik inbyggd, samtidigt som användningen av NFC ökat. Det sker även en utveckling inom mobila betalningar och användar-verifiering med användning av NFC, då NFC förenklar detta. Med detta sagt kommer vi att arbeta med detta i detta kandidatexamens-arbete där vi fokuserar på NFC samt Power over Ethernet som använder MSP430 chippet som kärna. Med dessa enheter kombinerade kommer en enkel rörelse med ett NFC kort över en NFC läsare som sedan skall ge åtkomst till en låst dörr. Detta i större kombination med en Internetuppkoppling kunna ge ägaren möjligheten att kunna skicka ut dörrnycklar till andra användare. I detta kandidatexamensarbete gjorde vi det möjligt för ett PoE kretskort bestående av ett MPS430 mikroprocessor att samarbeta med en NFC läsare genom SPI protokollet. Genom att utveckla detta projekt hoppas vi att vårt slutresultat leder till en enklare delning av nycklar med hjälp av denna teknologi.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Flores, Ryan Maximiliano. "Design of load-lock door for unit dose continuous lyophilization process for complex biologics". Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127917.

Texto completo
Resumen
Thesis: S.B., Massachusetts Institute of Technology, Department of Mechanical Engineering, May, 2020
Cataloged from the official PDF of thesis.
Includes bibliographical references (pages 61-62).
The process of unit dose continuous lyophilization consists of moving vials containing unit doses of pharmaceutical product though a series of process chambers with varying pressures and temperatures. In order to move the vials between process chambers with varying pressures without disturbing the conditions within each respective chamber, a load lock is required. Although load locks are commonly used in the semiconductor industry, existing designs are not directly applicable to the unit dose continuous lyophilization process due to the unique geometric constraints on the system. This thesis document details the design of a load-lock door for the unit dose continuous lyophilization process. To meet the load-lock door functional requirements, a four-bar linkage load-lock door and a load-lock door with ground pivots offset from the sealing surface were designed. Because the driving performance parameters cannot be reliably modeled, the seal performance, particle generation, and seal adhesion of each design will be experimentally tested. The highest performing design will be chosen and improved based on the experimental results.
by Ryan Maximiliano Flores.
S.B.
S.B. Massachusetts Institute of Technology, Department of Mechanical Engineering
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Ruwaida, Bassam y Toni Minkkinen. "Home Automation System : A cheap and open-source alternative to control household appliances". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137741.

Texto completo
Resumen
This project revolves around creating a home automation system prototype with the main focus being the ability to lock/unlock a door through the internet. The system consists of a central device, a server and an Android application.The central device is a microprocessor, in this case, a Raspberry Pi that connects to the Internet and receives an order to control a motor which in turn turns the lock with the help of gears. The ability to rotate the motor in both directions is achieved by the use of an H-bridge. The server manages users and devices, and handles the communication between the application and the central device. Users and devices are stored in a database on the server. The application is a frontend which presents the user with a list of devices to interact with.The main prototype where the Raspberry Pi acted as a central device was abandoned due to time and resource constraints. It was instead used to control the motor directly. This brought up some problems concerning powering the device using batteries. The software of the prototype is mostly working but due to the same time limitations not all planned features could be implemented.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Guerra, Ana Catarina Xavier Peixoto. "Impacto do Locus de Controlo e estratégias de coping em doentes com dor crónica". Master's thesis, 2010. http://hdl.handle.net/10400.14/9108.

Texto completo
Resumen
Mestrado em Psicologia
Em Portugal existe uma quantidade muito limitada de estudos acerca do impacto do Locus de Controlo e as estratégias de Coping utilizadas pelos pacientes com dor crónica. A dor é um fenómeno fisiológico de importância fundamental para a integridade física do indivíduo. As crenças que os pacientes possuem acerca da doença bem como as estratégias por estes utilizados são de enorme relevância para o sucesso da diminuição da dor experienciada por parte do sujeito. A presente investigação aborda o tema da dor crónica, procurando estudar a relação entre o locus de controlo bem como as estratégias de coping pelos pacientes com dor crónica na adaptação à sua nova condição médica. A amostra será constituída por 72 pacientes todos pertencentes à consulta da Dor do Centro Hospitalar do Alto Ave (CHAA). Foram aplicados quatro instrumentos de avaliação: Questionário Sócio- Demográfico e Clinico, Questionário de Meios para lidar com a Dor (Brown, 1995), a Escala Visual Anológica (2000) e o Questionário de Crenças do controlo da dor (Skevinghton, 1995). De uma forma geral, os resultados demonstram que os sujeitos que participaram neste estudo não possuem estratégias de coping adequadas, o que demonstra uma atitude rectro-activa perante a doença. Uma grande maioria destes sujeitos tende-se a acomodar bastante ao papel de doente, desempenhando com bastante dificuldade a sua actividade quotidiana e laboral. Relativamente à avaliação das crenças, podemos constatar que os sujeitos que participaram neste estudo possuem um locus de controlo virado para o exterior, isto é, depositam a melhora da sua doença nos médicos especialistas e em crenças superiores, afirmando que a uma melhoria do seu quadro geral passará pela ajuda destes. Assim, não executam nenhuma actividade pró-activa virada para os ganhos terapêuticos. Este estudo tem como finalidade contribuir para uma melhoria do conhecimento acerca da dor e do impacto desta na qualidade de vida numa amostra constituída por pacientes portugueses. Uma reestruturação das crenças e atitudes disfuncionais dos pacientes em relação com a sua dor, ajustando as necessidades às suas realidades, pode evidenciar-se como de extrema eficácia.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Dionne, Micheline. "Etude traductologique d'une traduction française de J.C. Oates". Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=26732.

Texto completo
Resumen
French literary translators have traditionally translated in an ethnocentric fashion in such a way that the translated work did not seem translated. They tried to write their translations in the same way the author would have, had he been French. Readers of French translations seemed quite satisfied with that approach. Yet there are translators who do not feel comfortable with this ethnocentric approach. They have done a great deal of reflection on their work, and are introducing new ways of translating literature. One of these is Antoine Berman. We have dedicated the first half of our work to his theories and the second half to a possible application of these theories to a novel by Joyce Carol Oates, I Lock my Door upon Myself. This novel was translated in France by Marie-Lise Marliere and its French title is Un amour noir. We will quote examples from the translation where we feel we can apply Berman's theory of "distorting tendencies" and make practical suggestions of alternative French translations. Our conclusion leads us to explore ways to better serve the French readers of Joyce Carol Oates.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Hamidu, Mariam. "The open-door approach to locus standi by the African Commission on Human and Peoples' Rights in respect of its non-state complaints procedure: in need of reform?" Diss., University of Pretoria, 2006. http://hdl.handle.net/2263/1213.

Texto completo
Resumen
"The question of locus standi regarding the non-state complaints procedure before the African Commission on Human and Peoples' Rights (the Commission) is a very flexibile one. Although the language of the African Charter on Human and Peoples' Rights (the Charter), the enabling powers and functions of the Commission, does not provide for such broad standing, the Commission has over its 20 years of operation, given broad interpretation to the question of standing by adopting the actio popularis doctrine. As a reslut the Commission has entertained communicatons from any person, group of persons or non-governmental organisation (NGOs), whether on their own behalf or on behalf of tothers. The location or nationality of such persons is also not a bar to standing. Consequently, the Commission has accepted communications from national NGOs operating in the country of the state party against whom the complaint is made, NGOs with a regaional focus, international NGOs, and non-African nationals. ... The study has five chapters. Chapter one introduces the study and the justification thereof. Chapter two explores the origin, nature and application of locus standi in domestic legal systems with particluar respect to private protection of public rights and human rights protection using Ghana, Mozambique and South Africa as case studies. Chapter three examines the standing requirements before other regional human rights protection systems namely the ECHR, and the IACHR as well as global human rights protection mechanisms throught the lens of the HRC, the CERD-Committee, the CAT-Committee and the CEDAW-Committee. Chapter four traces and assesses the development of the broad standing requirements before the Commission regarding its non-state communications procedure and the problems associated with them. And Chapter five presents the conclusions and recommendations of the study." -- Introduction.
Thesis (LLM (Human Rights and Democratisation in Africa)) -- University of Pretoria, 2006.
Prepared under the supervision of Mr. Angelo Matusse at the Faculty of Law, Universidade Eduardo Mondlane, Maputo, Mozambique
http://www.chr.up.ac.za/academic_pro/llm1/dissertations.html
Centre for Human Rights
LLM
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Nečas, Petr. "Výroba součásti dveřního zamykání sdruženým nástrojem". Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2014. http://www.nusl.cz/ntk/nusl-231192.

Texto completo
Resumen
Academic thesis, drawn up within the framework of engineering studies, presents a proposal optimal production of garage door lock striker. The part is manufactured from steel sheet S275JR of 1.5 mm thickness. By the analysis of its possible methods of production, with regard to the required annual series of 500,000 pieces, was chosen technology of manufacturing the part in the compound tool by blanking and bending processes. For these technologies was designed solution of the compound tool and automatic production line with the eccentric crank press SMERAL S160, where is the compound tool fixed. The measure of financial performance of manufacturing the part is economical assessing. In the current state is investment return in the production of 179,186 pieces of the parts.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Šterc, Filip. "Bezklíčový přístup do vozidla pomocí technologie Bluetooth Low Energy". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413160.

Texto completo
Resumen
Tato práce se zabývá návrhem demonstračního kitu bezlíčového přístupu pro vozidla s využitím nejnovějších integrovaných obvodů Bluetooth Low Energy a budičů automobilové sběrnice od společnosti ON Semiconductor. Aplikace umožňuje ruční i automatické odemykání dveří vozidla ze vzdáleného klíče realizovaného chytrým telefonem. Řešení se zabývá detekcí vzdálenosti vzdáleného klíče, bezpečností BLE spojení a komunikací přes automobilovou sběrnici LIN mezi moduly demonstračního kitu.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Hsieh, Wen Te y 謝文德. "2.4G Wireless Keyless Door Lock". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/40185369417959543087.

Texto completo
Resumen
碩士
逢甲大學
資訊電機工程碩士在職專班
103
The keyless door lock is a mature technology, always used in vehicle. The basic theory is using RFID (Radio Frequency IDentification). If user kept the key, and the car door will unlock automatically when the key near the car door. It is a convenience designing, which decrease time to find out the key to unlock door. The less time we spend on finding key, unlock door, the safer it is. However, such kind of convenient design just used in car, not in the house. The target of this research is to make a low cost and low power consumption keyless system for house door lock. There is a new design for keyless: use infrared to detect people. This new design will let door detect and unlock automatic, without push button. This system include three main parts, a remote control with key, door -lock which includes infrared detector , and small motor to lock or unlock door lock and a small sensor to detect the door locked or not. The remote control will use G-sensor to detect the moving of user, to wake up MCU to do the 2.4G RF detect. The door lock will use infrared to detect anyone in front of the door, then opening 2.4G RF to do communications. The last part is the door lock MCU to control a small motor to lock or unlock door, and a sensor to check the action is done or not. It’s hard to find such kind of product which used keyless lock in a house. Because of the cost and power consume is not good. So this is the reason to do the research, wish to solve these problems, and make a new productive value product. After calculation and some test, when using a 2A-Hr battery, the sample could keep standby 781 days and lock/unlock once a day. The remote control will keep working over 1100 days while using the 2A-Hr battery. This system will keep longer standby and using time, better than most other electronic door locks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Ferreira, Ricardo Filipe Rodrigues. "Cognitive Notification System for Door Lock". Master's thesis, 2018. http://hdl.handle.net/10362/75033.

Texto completo
Resumen
Most of the time, home automation devices provide peace of mind to their users by helping them in managing their house’s heat system, their garden watering or even controlling their home’s security. All the home automation devices connect to a network and they gather massive quantities of data that, most of the time, is underappreciated and only used to notify the users about real-time events. Smart locks provide easy access to buildings and, like other home automation devices, generates a lot of rich data that can be used, and studied, to provide interesting features to their users. This work proposes a smart lock cognitive notifications system that studies the smart lock activity generated data to provide notifications regarding the user’s behavior to the system administrator through a smartphone application. The developed system comprises a cloud computing component that is responsible for the communications between all the system’s modules, data storage and ultimately it runs the cognitive notification system. To generate the needed data for the notifications system a smart lock prototype was also developed. The users can control the smart lock by using a smartphone application that includes several useful features. The whole system works reliably and can be a good addition to the home automation market by enabling new possible features that will make the users lives more comfortable.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

CHU, JUNG-HO y 朱榮和. "Strtegic Alliance Case Study – Door Lock Industry". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/37198701836620501051.

Texto completo
Resumen
碩士
國立中山大學
高階經營碩士班
94
Abstract For recent years, enterprises in Taiwan face the challenges of global competition. Most of Taiwan companies cannot compete with international companies on capital or scale. Thus cooperation with competitors or formation of strategic alliance become one of the best policy of reducing management and sales cost of entering new market and business risks. For the small-and-medium size enterprises which own unique skills but are lack of resources and new technologies, it could be the niche of entering global market to obtain transfer of technologies and management skill from superior internationalized enterprises. Door lock manufacturing industry is an absolute conservative industry. From the ancient year, due to security concern, it was a family inherited business. Through technology breakthrough and industrial revolution, it gradually turns into a mass production industry. Like most of the other industry, in recent years, Taiwan was developed to be an important manufacturing base of the global door lock industry. This thesis adopted the exploring methodology. It conducted its study based on the industrial analysis. It analyzes the door lock industry through horizontal analysis – competitor analysis and vertical analysis – supply chain analysis. It further create the following assumptions based on the resources interdependence theory, transaction cost theory and Porter’s five forces analysis: 1. The motivation of strategic alliance is based on the resources interdependence theory. 2. The selection of partner in the strategic alliance is based on the transaction cost theory. 3. The objectives of strategic alliance are based on Porter’s five forces analysis. Based on the above assumptions, this study conducted analysis on the strategic alliance project in between Taiwan Fu Hsing Industrial Co. Ltd. and Ingersoll Rand Group of companies. Through in-depth interviews with management executives from both companies, this study build up a model confirming the above assumptions. Further more, this thesis also present a series of recommendations to both companies in hope of leading this strategic alliance project into a win-win situation. Key words: Strategic alliance, Door lock industry
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Yung-ChingShieh y 謝永勁. "Intelligent Door Lock Switch Design Based On Speaker Identification". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/tkrcbg.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Huang, Liang-Chieh y 黃良杰. "Radio Frequency Identification Control Door Lock Take Off Tradition Machinery Key". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/bu9t63.

Texto completo
Resumen
碩士
國立虎尾科技大學
機械與機電工程研究所
98
This research project scope to establish whole set hotel management system management system construction using Radio Frequency Identification, the first issue contains the main construction analysis, the system software and the hardware demand analysis, and contains the R.F.I.D. hardware equipment low-level language transformation to connect rear end the human affairs checking attendance system software application program interface, writes this API application program interface with Visual Basic (Application Program Interface). Namely for this reason paper subject. The second issue develops the programming language by next session of graduate student Mr. Huang Jianlong, mainly checks attendance at the hotel staff human affairs this domain, also already developed completes, the third issue serves for the boarder demand links, person who development this part waits later has the interest. This paper (Radio Frequency Identification is called R.F.I.D by the wireless radio frequency identity recognition system.) and the anode lock, for the experimental study locking device kto prevent going, the discussion international five-star hotel manager, various floors, the room, changes to difference of the wireless radio frequency management system management system signal output with the traditional key opening mechanical door lock system. And contains the security rating, each floor Vian rank, president anteroom and garret special management, gatekeeper server, steward and house clean personnel''s disposition, how to penetrate the science the control, effectiveness, and the accurate processing customer (moves in hotel visitor) the question. If the visitor rests quite late, but sweeps clear the room the personnel, do not know the circumstances of the matter the door open, to the visitor is quite impolite, but except president the anteroom or the high rank room, we may arrange the specialist to serve, if each room must depend on the manpower memory or the control, will hear frequently surely with visitor''s apology sound, I want in an international five-star hotel not to allow that this kind of matter will occur.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Chiu, Shih-Hao y 邱士豪. "An Desigu of a elass of Speech Recognition to Intelligent Door Lock". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/55255750634242046429.

Texto completo
Resumen
碩士
聖約翰科技大學
電機工程系碩士班
98
In this research, the authors employ the corresponding technologies as to the Micro-chip of Analog/Digital converter and combined with remove control tech. and security protection tech. to design a noble Intelligent Door Lock. There are some merits in the proposed design, (1) the proposed design can precisely protect the target house by the Micro-chip IC(HT9170), (2) the proposed design with the abilities to remove control the electric equipment in house through the Internet. Numerous simulations have been made to verify the efficiencies of the proposed design. Keywords: Micro-chip, Analog/Digital converter, HT9170. Electric equipments.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Feng, Ming-Tien y 馮明典. "Study of user preference on different unlock combinations of a smart door lock". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/7w96uf.

Texto completo
Resumen
碩士
國立臺北科技大學
工業工程與管理系EMBA班
105
The rapid development of science and technology cause peoples lives have undergone tremendous changes. The rapid rise of the smart home industry make people have a new hope for future life. The door is the first hurdle to enter a room and is used to prevent dangerous people to enter the room. A house door is an important barrier to ensure life and property safety of a family. The door lock is the most important part of the door, so it is the most critical anti-theft device in the family. Currently on the market, many different technologies have been used for unlocking smart lock products. However, most people have little experience with the use of such technology products. Users’ acceptance and preference to different functional combinations of a door lock have not been detailed by previous researches. For smart lock products, most people are still in the wait-and-see stage. The future development of science and technology in enhancing residential safety is closely related to intelligent lock. This study uses Analytical Hierarchy Process to explore the effect of smart door lock combination on users’ preference. Sixty subjects, divided into groups of 29 underage and 31 adults, were recruited to participate the experiment for determining their preference on all the combinations of two unlock functions taken from fingerprints, passwords, and inductive cards. Experimental results show that underage and adults have the same preference on the lock combination. The unlocking combination of fingerprint and password is the most preferable among the three combinations. The subjects put more weight on the safety than on the convenience and habit.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Wu, Chen-Yi y 吳貞儀. "The Research and Implementation of Keyless Entry System for Home Door Lock Application". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/28751113913155066843.

Texto completo
Resumen
碩士
醒吾技術學院
資訊科技應用研究所
98
Remote Keyless Entry (RKE) is often used in the vehicles and garage to lock or unlock the door. The RKE can easily be used by users carrying a fob and pressing the lock or unlock buttons. By combining the passive induction coupling of Radio Frequency Identification (RFID), RKE may lead in another system a Passive Keyless Entry (PKE) system, which can be applied in hands-free home door unlock system. Likes a remote controller, the user’s transponder normally states in sleep mode, and is triggered by a low radio frequency (LF) signal, and subsequently uses an Ultra-high radio frequency (UHF) signal to take authentication with door’s device. This step is initiated when user attempts to unlock a door, the door device automatically sends a LF wakeup signal to trigger the user’s transponder to take the authentication process. The low-cost 8 bits microcontroller can be used to implement the transponder. The transponder can reduce the power consumption, and the use of UHF can increase the distance of radio frequency. In the article, the appliances of the home door unlock system and propose solutions were discussed the possible problems. The system consists of two units the reader at the lock device and the transponder at the user. In order to provide a higher level of security, these two units share the same 128-bits secret-key and perform the challenge-response mechanism to authenticate each other. To enhance safety, design both ends of the respective random code (Random number) to AES-128 bits encryption algorithm, and only shorter than Hash message sent to replace the whole ciphertext decryption algorithms or complex, to the radio transmission The goal of time minimization. Simple software implementation of AES-128 algorithm, the high-security authentication mechanism to prevent possible security attacks. Collision problems are also solved by using different anti-collision mechanisms to decrease signal collision and to increase system useful.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

WANG, TIAN-LONG y 王添隆. "Simple Realization of Internet of Things Design - Taking the Door Lock as an Example". Thesis, 2018. http://ndltd.ncl.edu.tw/handle/f77yd6.

Texto completo
Resumen
碩士
醒吾科技大學
資訊科技應用系
106
Modern electronic products, such as IoT locker, is aimed to be controlled by smartphones through human-machine interface. However, it is challenging to meet the needs of IoT communication protocol on a smartphone APP. Hence, we try to develop a simple achieved IoT structure on smartphone APPs. This paper brings forward a simple implement of IoT design on the development of smartphone APP by building a set of MQTT Server and Web Server. Such design can also be built by general technique APP developers. In general APP developing environments, there are several SDK source codes that come in handy, yet, it becomes more difficult when dealing with different operating systems and encryption. As an elementary school teacher, I resolved this obstacle by replacing IoT’s control and application with Web Server, which agrees with the IoT encryption protocol. The smartphone APP was created by App Inventor 2 for controlling function. The approach of this work is to let IoT’s MQTT Server also become Web Server. The application of PC and smartphone will control the IoT locker directly through website or web API with no need of installing MQTT. Conclusively, it brings contribution towards family convenience, personal capital security, and encryption or password modification. In addition, it increases the efficiency of such system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Lin, Yuh-Ren y 林郁人. "The development and implementation of remote control door-lock-system using HTTPS secure machanism". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/26549145231165203168.

Texto completo
Resumen
碩士
亞洲大學
光電與通訊學系碩士班
98
In this paper, we propose and implement a remote control system for door lock based on https mechanism. Such a system can be queried, managed, and controlled by using any device with web browsers, such as personal computers, PDAs, or even smart phones. Via the technology of internet security, this system can be a key-free one for opening the doors. Connecting with the concepts of e-healthcare, this system may avoid losing the chances to save the people’s lives under emergencies. The proposed system utilizes the https mechanism to protect the legality of the authorizations. Hence, many platforms are usable to do so. Except the well-known PCs, any device which supports internet access may be properly used for controlling the door lock, such as devices with WiFi,WiMAX, or the 3G cell phones. Once the users install the proposed system, following goals can be achieved: 1) The authorizations may be identified by a remote server via internet accesses. 2) The https mechanism may ensure the security during transferring the packets. 3) Every user in the server may construct an ID and a password. If any abnormal behaviors are detected, the usage right can be changed along the designed rules. 4) The log files are preserved in the database. One can query the records via web browsers. In the future, we hope that the system may cooperate with the police stations or security companies to enhance the functions to provide. Keyword: HTTPS、PC、Smart phone、PDA、3G、WiFi、WiMAX、MySQL、PHP、e-Healthcare.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Fa-Wu, Wen y 吳文發. "The Creation of the Image of the Chinese Twelve Zodiac Animals for Door Lock Design". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/26710433786245233563.

Texto completo
Resumen
碩士
樹德科技大學
應用設計研究所
104
In product design, besides the color matching, price, practicality, after service and appearance design ,are factors that consumers care about; culture feature also plays an important role to the design of nowadays. Mute culture and story in design can not only elevate product’s feature but also stimulate consumer’s emotion projection. This can be the technique utilized in product design. Chinese culture lasts for thousands of year. In Chinese history, many traditional stories and fairy tales circulated from ancient to the present day, and many creators extend these historical stories into their design concept. For example, the particular culture features of Chinese zodiac sign can be an element that is injected into door lock design; make the strong culture ambience become a symbol of taste. Chinese zodiac sign is widely used in numerology, and Chinese people strongly relate Chinese zodiac sign into personal destiny. This is a thought inherit from ancient and can easily generate resonate with consumer while applying this thought into product creation. Door Lock is necessary to our lives. The product development turns from traditional mechanical structure to electronic to meet market trend. The consumer does not only need security but also convenience and collection. This research is based on strong Chinese culture background, collecting various door lock types that are collocated with Chinese Zodiac sign image concept, utilizing this image concept for creation, and constructing products combined the cultural goods and daily supplies that could elevate the product value and charm. Collecting literature related to Chinese Zodiac sign and creative image concept can provide the product developing designer ideas for creating reference, and blend it into door lock appearance design. In this research, engineering 3D model is used to establish product image of Chinese Zodiac sign, the technique of 3D printing FDM and material PLA are also utilized for prototype creation, which can overcome the limit of traditional casting tool fabrication and process in design stage.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Chang, Kang-Wei y 張剛偉. "Optimum Design selection in Free Dimension Door Lock using Finite Element Method and Taguchi Method". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/44243676699517330648.

Texto completo
Resumen
碩士
大葉大學
工業工程與科技管理學系碩士在職專班
94
In the industry, the design procedure of the products is often a supreme secret, the design procedure is a important part, besides best design of modeling (appearance), the design of the mechanical will be the key to establishing the products can succeed in going on the market in the feature; In the industry researches and develops units and generally uses the experience rule to design or analyses the products, it is quite huge that resources caused are wasted, but the experience accumulated may become and does not spread secret, make newly into staff's solution of seeking like the indigenous method steel-making again. This research use offer one kind to develop the way to the research and development designer of the industry in coordination to enable in accordance with following to some extent, and then develop the design method which replace the experience rule. This research mainly discuss company and researches and develops the products of tool to lock of the modeling produced by oneself, because product this handle load strength unable to reach the designing requirement to link board, cause a lot of questions of deriving used, so we use finite element method with taguchi method to search and solve to design the optimization of the intensity with the limited resources, In addition this research will analyze a method improve present products problem and accord with and use trying one's best with the least principle of the material ; The part of the finite element method for this research is mainly use ANSYS software to analyze, Finally, the optimal design and used ANSYS to verify the best research constitute by taguchi method and then verify method in the field to search and match since guide best with ANSYS and experimental methods after asking out to design the optimization condition in the end finally.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Ren, Je-Hong y 任哲宏. "Design and Implementation of the Door Lock Control Based on Near Field Communication of a Smartphone". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/86913537217981659897.

Texto completo
Resumen
碩士
輔仁大學
電機工程學系碩士班
104
This design integrates the near field communication (NFC) reader of a smartphone device with the door lock control system to provide a convenient single button operation. This design also offers three operation modes to the user in order to allow a one-time password (OTP) with a time stamp permission to match the user's password to thus enhance the door’s security. The door lock control system is fixed on the door, and also provides both the sleep state and the standby state to save power consumption for a long time operation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Chou, Wei-Wei y 鄒薇薇. "Female Selfhood in Tori Morrison's Song of Solomon in Joyce Carol Oates' I Lock My Door Upon Myself". Thesis, 1996. http://ndltd.ncl.edu.tw/handle/82684231794538581349.

Texto completo
Resumen
碩士
中國文化大學
西洋文學研究所
85
Toni Morrison and Joyce Carol Oates are famous contemporary feministwriters, they both vividly describes the oppressed female characters in their works to present the problems in a patriarchal, racist and capitalisticsociety. Both of them offer many valuable survival strategies to these oppressed women. In the study, I attempt to examine the oppressed female'sselfhood as demonstrated in the works. There are four chapters in this thesis. Chapter one introduces the authors and their works, as well as the purposes contained in these works. This chapter also discusses the oppression in the patriarchal, racist and capitalisticsociety toward women and blacks. Chapter two examines Morrison's motivationand expectation and the female characters' selfhood in Song of Solomonfocusing especially on Pilate's self-determing selfhood. Chapter three presents the relationship between Oates and her work, Calla's and the narrator's selfhood, and Oates' expectation toward future. Chapter four focuses on the similar and different oppression between black women and white women and the survival strategies for women in an oppressive society.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

WANG, Tsun-Jui y 王純瑞. "A Study in Enterprise’s Reorganization and Transformation of Door Lock Industry ─Based On TONG LUNG METAL INDUSTRY CO". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/vcj2t8.

Texto completo
Resumen
碩士
國立臺灣科技大學
管理研究所
95
Focusing on Tong Lung’s relief from its finance crisis in 1998, this research explores the corporation’s reorganization and transformation, how they avoided the bankruptcy, reconciled internal disputes and reached the goal of restoration, and, after the restructuring, what strategy and transformation process to take for rebuilding the cooperate value. This case can be reference to those companies ever experiencing finance crisis. By the four methods of literature exploration, case study, field research and empirical study, this research probes into Tong Lung’s strategy and process in restructuring and transformation, and we reached the key success factors as follows: 1.Advanced Reorganization Package Mode: It is the combination of out of court consultation and formal reorganization process, the reorganization completed by the support from debtor. 2.New Shareholder Obtaining Super Majority via Reorganization Process: Super Majority enables centralization of management for effective reorganization and transformation. 3.Strong New Cooperate Governance: Finance and Sales & Marketing lead by new management while lockset tech developed by Tong Lung’s professionals, the strong organizational culture completed the transformation. 4.New Business Layout: Cooperating with international leading brands, raising the percentage of OEM & ODM and being listed into the supply chain of global lockset industry are the new business arrangement. 5.Professional Manager in Top Management: The present two top managers are professionals in company governance and management. 6.Familiarity in Law: Many legal issues are involved during the procedure of company reorganization, the completion of reorganization was attributed the professional Law Firm ‘Lee and Li”.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Coutinho, Fernando Pedro Lima. "Associação entre morbilidade psicológica, dor, crenças da saúde, locus de controlo e realização da mamografia". Master's thesis, 2018. http://hdl.handle.net/10400.14/27357.

Texto completo
Resumen
Este estudo teve como principal objetivo a avaliação dos comportamentos de adesão ao rastreio e diagnóstico do cancro da mama no sexo feminino. Para tal, recorreu-se a uma amostra de 120 mulheres, utentes da Clínica Mais Saúde de Joane Unipessoal Lda., nas quais foram aplicados diversos instrumentos, nomeadamente um questionário sociodemográfico, um questionário de adesão aos meios de rastreio do cancro da mama, a escala HADS, a escala EVA e as escalas de Crenças de Saúde (CS) e de Locus de Controlo de Saúde (LCS). Atualmente, em Portugal, o cancro da mama é a doença oncológica com maior incidência, prevalência e mortalidade no sexo feminino. O cerne deste problema parece estar relacionado com a baixa adesão a comportamentos de rastreio, influenciados sobretudo pelo nível de conhecimento acerca dos potenciais benefícios da sua prevenção, pelas crenças de saúde, pelo locus de controlo de saúde e ainda, pela dor física e ansiedade existente aquando a realização do exame. Como principais resultados deste estudo científico, verificamos uma associação estatisticamente significativa entre as variáveis de habilitações literárias, benefícios percebidos, barreiras percebidas e HADS na motivação para a realização do exame, nas variáveis socioeconómicas e gravidade percebida com a frequência de rastreio subsequente, e ainda podemos verificar uma correlação entre a dor aquando a realização do exame mamográfico associados a fatores como a idade e a ansiedade/depressão sentida antes da realização da mamografia. Como conclusão, os dados obtidos contribuem para uma melhor compreensão de todos os comportamentos de adesão e realização da mamografia, para que seja possível uma reformulação dos programas de intervenção e uma melhoria dos comportamentos saudáveis no sexo feminino, alterando as crenças e o locus de controlo do exame.
This study aimed to investigate the behavior of breast cancer screening and diagnosis of breast cancer. Through a sample of 120 patients, users of the Health Clinic of Joane Unipessoal Lda., In which instruments such as a sociodemographic questionnaire, a questionnaire for adherence to the means of screening for breast cancer, the HADS scale, the EVA scale, and health belief scales and health control locus. Currently, in Portugal, breast cancer is the most common oncological disease, prevalence and mortality in females. The core of this problem seems to be related to the low adherence to screening behaviors, mainly influenced by the level of knowledge about the potential benefits of its prevention, health beliefs, locus of health control, and physical pain and anxiety at the time of the examination. As the main results of this scientific study, we found a statistically significant association between the variables of literacy, perceived benefits, perceived barriers and HADS in motivation for the test, socioeconomic variables and perceived severity with the frequency of subsequent screening, and we can still to verify high pain when performing the mammographic examination associated with factors such as age and anxiety/depression felt before the mammography. The data obtained contribute to a better understanding of all adherence behaviors to breast cancer screening, so that it is possible to reformulate intervention programs and improve the healthy behaviors of women, leading to changes in beliefs and locus of control breast cancer and mammography.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Yi-MingChu y 朱奕銘. "A Lagrangian Relaxation Approach to the Mixed-product Assembly Line Sequencing Problem: A Case Study of a Door-Lock Company in Taiwan". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/13054043277030493831.

Texto completo
Resumen
碩士
國立成功大學
交通管理學系碩博士班
100
This thesis investigates the mixed-product assembly line sequencing problem for a door lock manufacturing company in Taiwan. Companies in the door lock industry schedule their production processes to minimize their costs while meeting customer demand. The variance and diversity of lock components complicate the mixed-product assembly line sequencing problem and directly influence the material requirement planning and human resources costs. The assembly line sequencing problem of one of the largest ironware manufacturing companies in Asia, company F, is studied and an integer programming mathematical model with constraints on production lines, labor, warehouse capacity, and order fulfillment rates is formulated to minimize the total cost. A heuristic based on the Lagrangian relaxation principle is devised to solve this mixed-product assembly line sequencing problem. The efficiency of the proposed Lagrangian relaxation heuristic is evaluated by comparing its solutions with those obtained using CPLEX. The results show that the proposed heuristic solves the real-world problem almost 15 times faster than CPLEX in terms of CPU time, with equal solution quality. The salient results and practical issues involved in this unique problem are discussed in detail.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía