Tesis sobre el tema "Door locks"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 32 mejores tesis para su investigación sobre el tema "Door locks".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Samuel, David. "RFID security in door locks". Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.
Texto completoRadio frequency identification, RFID is a technology that is used in many fields including locks. The unlimited access to the reader and the transponder has resulted in severe security weaknesses and made it possible to apply different attacks. To classify door locks as secure they must at least fulfil two main criteria: the first is the use of a challenge-response authentication protocol and the second is to deploy sophisticated and secure algorithms.
MiFare classic and KeeLoq are two widely applied technologies that are still in use in many security critical applications and are considered to be secure but which have been broken by cryptanalysis and with modest efforts and cost.
How secure a certain solution is depends on how expensive it is to buy the equipment that can break the system and reveal the secret key and how secure a lock should be depends on the value of what it is protecting.
The dropping price of powerful computers and the availability of security related information on the web will lead to an increase of the number of attacks on different systems.
By the time this thesis is published those locks evaluated are not secure enough, to overcome the security shortage some improvements have to be made such as: the use of sophisticated algorithms, the use of longer key of at least 128-bit, the use of non-deterministic random number generators and the use of pure hardware solutions both in the receiver and the transmitter to reduce leakage.
Viderberg, Arvid. "Security evaluation of smart door locks". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254962.
Texto completoSmarta lås är en del av sakernas internet (IoT). Smarta lås används som ett komplement till traditionella lås för att göra det enklare att dela nycklar elektroniskt. Smarta dörrlås monteras på befintlig dörr och gör det möjligt för användare att styra låset med sin smartphone. I den här rapporten vill vi undersöka om tidigare kända attacker på smarta lås fortfarande finns i dagens tillgängliga lås på svenska marknaden. Genom att studera tidigare arbete och genomföra en hotmodell skapar vi attacker för att applicera på låsen, för att kunna svara på vilka brister som finns i smarta dörrlås idag. Resultatet drar slutsatsen att det finns flera brister i dagens smarta lås, där de allvarligaste har rapporterats till tillverkaren. De undersökta låsen visar sårbarhet i konsistens mellan tillstånd, lösenordspolicys och lösenordsåterställning.
Andersson, Tim. "Bluetooth Low Energy and Smartphones for Proximity-Based Automatic Door Locks". Thesis, Linköpings universitet, Interaktiva och kognitiva system, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107332.
Texto completoSopi, Jeton. "NFC Door Lock". Thesis, Högskolan i Halmstad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30306.
Texto completoANDERSSON, FILIP y DAVID BERGLING. "Knock-Knock Door Lock : Unlocking your door with a secret knock sequence". Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279814.
Texto completoDörrlåset - en grundläggande funktion i varje modernt hem, och samtidigt en produkt som idag genomgår drastisk förändring. Som resultat av den digitala revolutionen finns det idag en uppsjö av olika digitala dörrlås som utnyttjar allt från touchskärmar till fingeravtrycksläsare. Syftet med projektet var att testa en annorlunda tappning på det digitala dörrlåset, och förverkliga något många hade drömt om i barndomen - ett dörrlås aktiverat genom ett eget hemligt knackningsmönster. Det hemliga knackningsmönstret skulle då bestå av både ett rytmiskt och ett positionellt mönster. Därmed skulle den som ville öppna dörren behöva knacka både rätt rytm, och på rätt ställen på dörren. För att spela in och analysera vibrationerna från knackningarna användes piezoelektriska sensorer kopplade till en Arduino Uno. Mekanismen som styrde själva upplåsningen bestod av en liten servomotor, två kugghjul och en kuggrem som kopplade samman det hela. Trots en begränsad tidsram och motgångar orsakade av coronaviruset lyckades en fullt fungerande prototyp med hög pålitlighet färdigställas. Den kunde med hög tillförlitlighet känns igen testsekvensen, som var introrytmen till ”We Will Rock You” knackat i mönstret av en kvadrat. Men även med felfri prestanda hade slutsatsen varit densamma. Säkerheten för systemet må vara exeptionell ur ett rent tekniskt perspektiv, men den faller platt när den mänskliga faktorn tas med i beräkningen. Risken att en potentiell inbrottstjuv helt enkelt tittar på när någon knackar det hemliga mönstret är för stor för att systemet någonsin skulle kunna betraktas som en seriös konkurrent till andra digitala dörrlås. Produkten är därmed bäst lämpad för användningsområden där nöjet av att använda den är av högre prioritet än själva säkerheten.
Petersson, Linus. "Peer-to-peer : time to lock the door". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1724.
Texto completoAlmosawi, Massar y Kristoffer Djupsjö. "IoT Security Applied on a Smart Door Lock Application". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230153.
Texto completoFöljande examensarbete beskriver utvecklingen av en IoT-produkt baserad på digitalisering av ett smart dörrlås där applikationen ansluts till internet för igenkänning av anställda som arbetar på ett kontor. Examensarbetet fokuserar primärt på säkerhetsaspekterna genom att notera de typiska säkerhetsutmaningarna som generella IOT-system utsätts för och summerar dessa utmaningar för att utveckla en funktionell och säker produkt från start av projektet. En mikrokontroller väljs ut specifikt för projektet och en testmiljö byggs för att undersöka och motverka eventuella säkerhetsbrister. Rapporten ger även detaljerad beskrivning av multi-master databasen Azure Active Directory och dess betydelse för att uppnå önskad säkerheten i systemet. En ny teknik som heter Eddystone introduceras i projektet för att betjäna som överföringsprotokoll till Bluetooth-beacons. Det sista steget i detta projekt kompletteras utvecklingen av systemet med Androidapplikation som ser till att alla utvecklade delsystem kommunicerar med varandra och levererar ett funktionellt och säkert flöde av IOT-systemet.
Karim, Rafid y Haidara Al-Fakhri. "Smart Door Lock : A first prototype of a networked power lock controller with an NFC interface". Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134894.
Texto completoDet blir allt vanligare med närfältskommunikation (NFC) i dagens samhälle, mobiltelefons-tillverkarna börjar utveckla nya telefoner med NFC teknik inbyggd, samtidigt som användningen av NFC ökat. Det sker även en utveckling inom mobila betalningar och användar-verifiering med användning av NFC, då NFC förenklar detta. Med detta sagt kommer vi att arbeta med detta i detta kandidatexamens-arbete där vi fokuserar på NFC samt Power over Ethernet som använder MSP430 chippet som kärna. Med dessa enheter kombinerade kommer en enkel rörelse med ett NFC kort över en NFC läsare som sedan skall ge åtkomst till en låst dörr. Detta i större kombination med en Internetuppkoppling kunna ge ägaren möjligheten att kunna skicka ut dörrnycklar till andra användare. I detta kandidatexamensarbete gjorde vi det möjligt för ett PoE kretskort bestående av ett MPS430 mikroprocessor att samarbeta med en NFC läsare genom SPI protokollet. Genom att utveckla detta projekt hoppas vi att vårt slutresultat leder till en enklare delning av nycklar med hjälp av denna teknologi.
Flores, Ryan Maximiliano. "Design of load-lock door for unit dose continuous lyophilization process for complex biologics". Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127917.
Texto completoCataloged from the official PDF of thesis.
Includes bibliographical references (pages 61-62).
The process of unit dose continuous lyophilization consists of moving vials containing unit doses of pharmaceutical product though a series of process chambers with varying pressures and temperatures. In order to move the vials between process chambers with varying pressures without disturbing the conditions within each respective chamber, a load lock is required. Although load locks are commonly used in the semiconductor industry, existing designs are not directly applicable to the unit dose continuous lyophilization process due to the unique geometric constraints on the system. This thesis document details the design of a load-lock door for the unit dose continuous lyophilization process. To meet the load-lock door functional requirements, a four-bar linkage load-lock door and a load-lock door with ground pivots offset from the sealing surface were designed. Because the driving performance parameters cannot be reliably modeled, the seal performance, particle generation, and seal adhesion of each design will be experimentally tested. The highest performing design will be chosen and improved based on the experimental results.
by Ryan Maximiliano Flores.
S.B.
S.B. Massachusetts Institute of Technology, Department of Mechanical Engineering
Ruwaida, Bassam y Toni Minkkinen. "Home Automation System : A cheap and open-source alternative to control household appliances". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137741.
Texto completoGuerra, Ana Catarina Xavier Peixoto. "Impacto do Locus de Controlo e estratégias de coping em doentes com dor crónica". Master's thesis, 2010. http://hdl.handle.net/10400.14/9108.
Texto completoEm Portugal existe uma quantidade muito limitada de estudos acerca do impacto do Locus de Controlo e as estratégias de Coping utilizadas pelos pacientes com dor crónica. A dor é um fenómeno fisiológico de importância fundamental para a integridade física do indivíduo. As crenças que os pacientes possuem acerca da doença bem como as estratégias por estes utilizados são de enorme relevância para o sucesso da diminuição da dor experienciada por parte do sujeito. A presente investigação aborda o tema da dor crónica, procurando estudar a relação entre o locus de controlo bem como as estratégias de coping pelos pacientes com dor crónica na adaptação à sua nova condição médica. A amostra será constituída por 72 pacientes todos pertencentes à consulta da Dor do Centro Hospitalar do Alto Ave (CHAA). Foram aplicados quatro instrumentos de avaliação: Questionário Sócio- Demográfico e Clinico, Questionário de Meios para lidar com a Dor (Brown, 1995), a Escala Visual Anológica (2000) e o Questionário de Crenças do controlo da dor (Skevinghton, 1995). De uma forma geral, os resultados demonstram que os sujeitos que participaram neste estudo não possuem estratégias de coping adequadas, o que demonstra uma atitude rectro-activa perante a doença. Uma grande maioria destes sujeitos tende-se a acomodar bastante ao papel de doente, desempenhando com bastante dificuldade a sua actividade quotidiana e laboral. Relativamente à avaliação das crenças, podemos constatar que os sujeitos que participaram neste estudo possuem um locus de controlo virado para o exterior, isto é, depositam a melhora da sua doença nos médicos especialistas e em crenças superiores, afirmando que a uma melhoria do seu quadro geral passará pela ajuda destes. Assim, não executam nenhuma actividade pró-activa virada para os ganhos terapêuticos. Este estudo tem como finalidade contribuir para uma melhoria do conhecimento acerca da dor e do impacto desta na qualidade de vida numa amostra constituída por pacientes portugueses. Uma reestruturação das crenças e atitudes disfuncionais dos pacientes em relação com a sua dor, ajustando as necessidades às suas realidades, pode evidenciar-se como de extrema eficácia.
Dionne, Micheline. "Etude traductologique d'une traduction française de J.C. Oates". Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=26732.
Texto completoHamidu, Mariam. "The open-door approach to locus standi by the African Commission on Human and Peoples' Rights in respect of its non-state complaints procedure: in need of reform?" Diss., University of Pretoria, 2006. http://hdl.handle.net/2263/1213.
Texto completoThesis (LLM (Human Rights and Democratisation in Africa)) -- University of Pretoria, 2006.
Prepared under the supervision of Mr. Angelo Matusse at the Faculty of Law, Universidade Eduardo Mondlane, Maputo, Mozambique
http://www.chr.up.ac.za/academic_pro/llm1/dissertations.html
Centre for Human Rights
LLM
Nečas, Petr. "Výroba součásti dveřního zamykání sdruženým nástrojem". Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2014. http://www.nusl.cz/ntk/nusl-231192.
Texto completoŠterc, Filip. "Bezklíčový přístup do vozidla pomocí technologie Bluetooth Low Energy". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413160.
Texto completoHsieh, Wen Te y 謝文德. "2.4G Wireless Keyless Door Lock". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/40185369417959543087.
Texto completo逢甲大學
資訊電機工程碩士在職專班
103
The keyless door lock is a mature technology, always used in vehicle. The basic theory is using RFID (Radio Frequency IDentification). If user kept the key, and the car door will unlock automatically when the key near the car door. It is a convenience designing, which decrease time to find out the key to unlock door. The less time we spend on finding key, unlock door, the safer it is. However, such kind of convenient design just used in car, not in the house. The target of this research is to make a low cost and low power consumption keyless system for house door lock. There is a new design for keyless: use infrared to detect people. This new design will let door detect and unlock automatic, without push button. This system include three main parts, a remote control with key, door -lock which includes infrared detector , and small motor to lock or unlock door lock and a small sensor to detect the door locked or not. The remote control will use G-sensor to detect the moving of user, to wake up MCU to do the 2.4G RF detect. The door lock will use infrared to detect anyone in front of the door, then opening 2.4G RF to do communications. The last part is the door lock MCU to control a small motor to lock or unlock door, and a sensor to check the action is done or not. It’s hard to find such kind of product which used keyless lock in a house. Because of the cost and power consume is not good. So this is the reason to do the research, wish to solve these problems, and make a new productive value product. After calculation and some test, when using a 2A-Hr battery, the sample could keep standby 781 days and lock/unlock once a day. The remote control will keep working over 1100 days while using the 2A-Hr battery. This system will keep longer standby and using time, better than most other electronic door locks.
Ferreira, Ricardo Filipe Rodrigues. "Cognitive Notification System for Door Lock". Master's thesis, 2018. http://hdl.handle.net/10362/75033.
Texto completoCHU, JUNG-HO y 朱榮和. "Strtegic Alliance Case Study – Door Lock Industry". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/37198701836620501051.
Texto completo國立中山大學
高階經營碩士班
94
Abstract For recent years, enterprises in Taiwan face the challenges of global competition. Most of Taiwan companies cannot compete with international companies on capital or scale. Thus cooperation with competitors or formation of strategic alliance become one of the best policy of reducing management and sales cost of entering new market and business risks. For the small-and-medium size enterprises which own unique skills but are lack of resources and new technologies, it could be the niche of entering global market to obtain transfer of technologies and management skill from superior internationalized enterprises. Door lock manufacturing industry is an absolute conservative industry. From the ancient year, due to security concern, it was a family inherited business. Through technology breakthrough and industrial revolution, it gradually turns into a mass production industry. Like most of the other industry, in recent years, Taiwan was developed to be an important manufacturing base of the global door lock industry. This thesis adopted the exploring methodology. It conducted its study based on the industrial analysis. It analyzes the door lock industry through horizontal analysis – competitor analysis and vertical analysis – supply chain analysis. It further create the following assumptions based on the resources interdependence theory, transaction cost theory and Porter’s five forces analysis: 1. The motivation of strategic alliance is based on the resources interdependence theory. 2. The selection of partner in the strategic alliance is based on the transaction cost theory. 3. The objectives of strategic alliance are based on Porter’s five forces analysis. Based on the above assumptions, this study conducted analysis on the strategic alliance project in between Taiwan Fu Hsing Industrial Co. Ltd. and Ingersoll Rand Group of companies. Through in-depth interviews with management executives from both companies, this study build up a model confirming the above assumptions. Further more, this thesis also present a series of recommendations to both companies in hope of leading this strategic alliance project into a win-win situation. Key words: Strategic alliance, Door lock industry
Yung-ChingShieh y 謝永勁. "Intelligent Door Lock Switch Design Based On Speaker Identification". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/tkrcbg.
Texto completoHuang, Liang-Chieh y 黃良杰. "Radio Frequency Identification Control Door Lock Take Off Tradition Machinery Key". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/bu9t63.
Texto completo國立虎尾科技大學
機械與機電工程研究所
98
This research project scope to establish whole set hotel management system management system construction using Radio Frequency Identification, the first issue contains the main construction analysis, the system software and the hardware demand analysis, and contains the R.F.I.D. hardware equipment low-level language transformation to connect rear end the human affairs checking attendance system software application program interface, writes this API application program interface with Visual Basic (Application Program Interface). Namely for this reason paper subject. The second issue develops the programming language by next session of graduate student Mr. Huang Jianlong, mainly checks attendance at the hotel staff human affairs this domain, also already developed completes, the third issue serves for the boarder demand links, person who development this part waits later has the interest. This paper (Radio Frequency Identification is called R.F.I.D by the wireless radio frequency identity recognition system.) and the anode lock, for the experimental study locking device kto prevent going, the discussion international five-star hotel manager, various floors, the room, changes to difference of the wireless radio frequency management system management system signal output with the traditional key opening mechanical door lock system. And contains the security rating, each floor Vian rank, president anteroom and garret special management, gatekeeper server, steward and house clean personnel''s disposition, how to penetrate the science the control, effectiveness, and the accurate processing customer (moves in hotel visitor) the question. If the visitor rests quite late, but sweeps clear the room the personnel, do not know the circumstances of the matter the door open, to the visitor is quite impolite, but except president the anteroom or the high rank room, we may arrange the specialist to serve, if each room must depend on the manpower memory or the control, will hear frequently surely with visitor''s apology sound, I want in an international five-star hotel not to allow that this kind of matter will occur.
Chiu, Shih-Hao y 邱士豪. "An Desigu of a elass of Speech Recognition to Intelligent Door Lock". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/55255750634242046429.
Texto completo聖約翰科技大學
電機工程系碩士班
98
In this research, the authors employ the corresponding technologies as to the Micro-chip of Analog/Digital converter and combined with remove control tech. and security protection tech. to design a noble Intelligent Door Lock. There are some merits in the proposed design, (1) the proposed design can precisely protect the target house by the Micro-chip IC(HT9170), (2) the proposed design with the abilities to remove control the electric equipment in house through the Internet. Numerous simulations have been made to verify the efficiencies of the proposed design. Keywords: Micro-chip, Analog/Digital converter, HT9170. Electric equipments.
Feng, Ming-Tien y 馮明典. "Study of user preference on different unlock combinations of a smart door lock". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/7w96uf.
Texto completo國立臺北科技大學
工業工程與管理系EMBA班
105
The rapid development of science and technology cause peoples lives have undergone tremendous changes. The rapid rise of the smart home industry make people have a new hope for future life. The door is the first hurdle to enter a room and is used to prevent dangerous people to enter the room. A house door is an important barrier to ensure life and property safety of a family. The door lock is the most important part of the door, so it is the most critical anti-theft device in the family. Currently on the market, many different technologies have been used for unlocking smart lock products. However, most people have little experience with the use of such technology products. Users’ acceptance and preference to different functional combinations of a door lock have not been detailed by previous researches. For smart lock products, most people are still in the wait-and-see stage. The future development of science and technology in enhancing residential safety is closely related to intelligent lock. This study uses Analytical Hierarchy Process to explore the effect of smart door lock combination on users’ preference. Sixty subjects, divided into groups of 29 underage and 31 adults, were recruited to participate the experiment for determining their preference on all the combinations of two unlock functions taken from fingerprints, passwords, and inductive cards. Experimental results show that underage and adults have the same preference on the lock combination. The unlocking combination of fingerprint and password is the most preferable among the three combinations. The subjects put more weight on the safety than on the convenience and habit.
Wu, Chen-Yi y 吳貞儀. "The Research and Implementation of Keyless Entry System for Home Door Lock Application". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/28751113913155066843.
Texto completo醒吾技術學院
資訊科技應用研究所
98
Remote Keyless Entry (RKE) is often used in the vehicles and garage to lock or unlock the door. The RKE can easily be used by users carrying a fob and pressing the lock or unlock buttons. By combining the passive induction coupling of Radio Frequency Identification (RFID), RKE may lead in another system a Passive Keyless Entry (PKE) system, which can be applied in hands-free home door unlock system. Likes a remote controller, the user’s transponder normally states in sleep mode, and is triggered by a low radio frequency (LF) signal, and subsequently uses an Ultra-high radio frequency (UHF) signal to take authentication with door’s device. This step is initiated when user attempts to unlock a door, the door device automatically sends a LF wakeup signal to trigger the user’s transponder to take the authentication process. The low-cost 8 bits microcontroller can be used to implement the transponder. The transponder can reduce the power consumption, and the use of UHF can increase the distance of radio frequency. In the article, the appliances of the home door unlock system and propose solutions were discussed the possible problems. The system consists of two units the reader at the lock device and the transponder at the user. In order to provide a higher level of security, these two units share the same 128-bits secret-key and perform the challenge-response mechanism to authenticate each other. To enhance safety, design both ends of the respective random code (Random number) to AES-128 bits encryption algorithm, and only shorter than Hash message sent to replace the whole ciphertext decryption algorithms or complex, to the radio transmission The goal of time minimization. Simple software implementation of AES-128 algorithm, the high-security authentication mechanism to prevent possible security attacks. Collision problems are also solved by using different anti-collision mechanisms to decrease signal collision and to increase system useful.
WANG, TIAN-LONG y 王添隆. "Simple Realization of Internet of Things Design - Taking the Door Lock as an Example". Thesis, 2018. http://ndltd.ncl.edu.tw/handle/f77yd6.
Texto completo醒吾科技大學
資訊科技應用系
106
Modern electronic products, such as IoT locker, is aimed to be controlled by smartphones through human-machine interface. However, it is challenging to meet the needs of IoT communication protocol on a smartphone APP. Hence, we try to develop a simple achieved IoT structure on smartphone APPs. This paper brings forward a simple implement of IoT design on the development of smartphone APP by building a set of MQTT Server and Web Server. Such design can also be built by general technique APP developers. In general APP developing environments, there are several SDK source codes that come in handy, yet, it becomes more difficult when dealing with different operating systems and encryption. As an elementary school teacher, I resolved this obstacle by replacing IoT’s control and application with Web Server, which agrees with the IoT encryption protocol. The smartphone APP was created by App Inventor 2 for controlling function. The approach of this work is to let IoT’s MQTT Server also become Web Server. The application of PC and smartphone will control the IoT locker directly through website or web API with no need of installing MQTT. Conclusively, it brings contribution towards family convenience, personal capital security, and encryption or password modification. In addition, it increases the efficiency of such system.
Lin, Yuh-Ren y 林郁人. "The development and implementation of remote control door-lock-system using HTTPS secure machanism". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/26549145231165203168.
Texto completo亞洲大學
光電與通訊學系碩士班
98
In this paper, we propose and implement a remote control system for door lock based on https mechanism. Such a system can be queried, managed, and controlled by using any device with web browsers, such as personal computers, PDAs, or even smart phones. Via the technology of internet security, this system can be a key-free one for opening the doors. Connecting with the concepts of e-healthcare, this system may avoid losing the chances to save the people’s lives under emergencies. The proposed system utilizes the https mechanism to protect the legality of the authorizations. Hence, many platforms are usable to do so. Except the well-known PCs, any device which supports internet access may be properly used for controlling the door lock, such as devices with WiFi,WiMAX, or the 3G cell phones. Once the users install the proposed system, following goals can be achieved: 1) The authorizations may be identified by a remote server via internet accesses. 2) The https mechanism may ensure the security during transferring the packets. 3) Every user in the server may construct an ID and a password. If any abnormal behaviors are detected, the usage right can be changed along the designed rules. 4) The log files are preserved in the database. One can query the records via web browsers. In the future, we hope that the system may cooperate with the police stations or security companies to enhance the functions to provide. Keyword: HTTPS、PC、Smart phone、PDA、3G、WiFi、WiMAX、MySQL、PHP、e-Healthcare.
Fa-Wu, Wen y 吳文發. "The Creation of the Image of the Chinese Twelve Zodiac Animals for Door Lock Design". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/26710433786245233563.
Texto completo樹德科技大學
應用設計研究所
104
In product design, besides the color matching, price, practicality, after service and appearance design ,are factors that consumers care about; culture feature also plays an important role to the design of nowadays. Mute culture and story in design can not only elevate product’s feature but also stimulate consumer’s emotion projection. This can be the technique utilized in product design. Chinese culture lasts for thousands of year. In Chinese history, many traditional stories and fairy tales circulated from ancient to the present day, and many creators extend these historical stories into their design concept. For example, the particular culture features of Chinese zodiac sign can be an element that is injected into door lock design; make the strong culture ambience become a symbol of taste. Chinese zodiac sign is widely used in numerology, and Chinese people strongly relate Chinese zodiac sign into personal destiny. This is a thought inherit from ancient and can easily generate resonate with consumer while applying this thought into product creation. Door Lock is necessary to our lives. The product development turns from traditional mechanical structure to electronic to meet market trend. The consumer does not only need security but also convenience and collection. This research is based on strong Chinese culture background, collecting various door lock types that are collocated with Chinese Zodiac sign image concept, utilizing this image concept for creation, and constructing products combined the cultural goods and daily supplies that could elevate the product value and charm. Collecting literature related to Chinese Zodiac sign and creative image concept can provide the product developing designer ideas for creating reference, and blend it into door lock appearance design. In this research, engineering 3D model is used to establish product image of Chinese Zodiac sign, the technique of 3D printing FDM and material PLA are also utilized for prototype creation, which can overcome the limit of traditional casting tool fabrication and process in design stage.
Chang, Kang-Wei y 張剛偉. "Optimum Design selection in Free Dimension Door Lock using Finite Element Method and Taguchi Method". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/44243676699517330648.
Texto completo大葉大學
工業工程與科技管理學系碩士在職專班
94
In the industry, the design procedure of the products is often a supreme secret, the design procedure is a important part, besides best design of modeling (appearance), the design of the mechanical will be the key to establishing the products can succeed in going on the market in the feature; In the industry researches and develops units and generally uses the experience rule to design or analyses the products, it is quite huge that resources caused are wasted, but the experience accumulated may become and does not spread secret, make newly into staff's solution of seeking like the indigenous method steel-making again. This research use offer one kind to develop the way to the research and development designer of the industry in coordination to enable in accordance with following to some extent, and then develop the design method which replace the experience rule. This research mainly discuss company and researches and develops the products of tool to lock of the modeling produced by oneself, because product this handle load strength unable to reach the designing requirement to link board, cause a lot of questions of deriving used, so we use finite element method with taguchi method to search and solve to design the optimization of the intensity with the limited resources, In addition this research will analyze a method improve present products problem and accord with and use trying one's best with the least principle of the material ; The part of the finite element method for this research is mainly use ANSYS software to analyze, Finally, the optimal design and used ANSYS to verify the best research constitute by taguchi method and then verify method in the field to search and match since guide best with ANSYS and experimental methods after asking out to design the optimization condition in the end finally.
Ren, Je-Hong y 任哲宏. "Design and Implementation of the Door Lock Control Based on Near Field Communication of a Smartphone". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/86913537217981659897.
Texto completo輔仁大學
電機工程學系碩士班
104
This design integrates the near field communication (NFC) reader of a smartphone device with the door lock control system to provide a convenient single button operation. This design also offers three operation modes to the user in order to allow a one-time password (OTP) with a time stamp permission to match the user's password to thus enhance the door’s security. The door lock control system is fixed on the door, and also provides both the sleep state and the standby state to save power consumption for a long time operation.
Chou, Wei-Wei y 鄒薇薇. "Female Selfhood in Tori Morrison's Song of Solomon in Joyce Carol Oates' I Lock My Door Upon Myself". Thesis, 1996. http://ndltd.ncl.edu.tw/handle/82684231794538581349.
Texto completo中國文化大學
西洋文學研究所
85
Toni Morrison and Joyce Carol Oates are famous contemporary feministwriters, they both vividly describes the oppressed female characters in their works to present the problems in a patriarchal, racist and capitalisticsociety. Both of them offer many valuable survival strategies to these oppressed women. In the study, I attempt to examine the oppressed female'sselfhood as demonstrated in the works. There are four chapters in this thesis. Chapter one introduces the authors and their works, as well as the purposes contained in these works. This chapter also discusses the oppression in the patriarchal, racist and capitalisticsociety toward women and blacks. Chapter two examines Morrison's motivationand expectation and the female characters' selfhood in Song of Solomonfocusing especially on Pilate's self-determing selfhood. Chapter three presents the relationship between Oates and her work, Calla's and the narrator's selfhood, and Oates' expectation toward future. Chapter four focuses on the similar and different oppression between black women and white women and the survival strategies for women in an oppressive society.
WANG, Tsun-Jui y 王純瑞. "A Study in Enterprise’s Reorganization and Transformation of Door Lock Industry ─Based On TONG LUNG METAL INDUSTRY CO". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/vcj2t8.
Texto completo國立臺灣科技大學
管理研究所
95
Focusing on Tong Lung’s relief from its finance crisis in 1998, this research explores the corporation’s reorganization and transformation, how they avoided the bankruptcy, reconciled internal disputes and reached the goal of restoration, and, after the restructuring, what strategy and transformation process to take for rebuilding the cooperate value. This case can be reference to those companies ever experiencing finance crisis. By the four methods of literature exploration, case study, field research and empirical study, this research probes into Tong Lung’s strategy and process in restructuring and transformation, and we reached the key success factors as follows: 1.Advanced Reorganization Package Mode: It is the combination of out of court consultation and formal reorganization process, the reorganization completed by the support from debtor. 2.New Shareholder Obtaining Super Majority via Reorganization Process: Super Majority enables centralization of management for effective reorganization and transformation. 3.Strong New Cooperate Governance: Finance and Sales & Marketing lead by new management while lockset tech developed by Tong Lung’s professionals, the strong organizational culture completed the transformation. 4.New Business Layout: Cooperating with international leading brands, raising the percentage of OEM & ODM and being listed into the supply chain of global lockset industry are the new business arrangement. 5.Professional Manager in Top Management: The present two top managers are professionals in company governance and management. 6.Familiarity in Law: Many legal issues are involved during the procedure of company reorganization, the completion of reorganization was attributed the professional Law Firm ‘Lee and Li”.
Coutinho, Fernando Pedro Lima. "Associação entre morbilidade psicológica, dor, crenças da saúde, locus de controlo e realização da mamografia". Master's thesis, 2018. http://hdl.handle.net/10400.14/27357.
Texto completoThis study aimed to investigate the behavior of breast cancer screening and diagnosis of breast cancer. Through a sample of 120 patients, users of the Health Clinic of Joane Unipessoal Lda., In which instruments such as a sociodemographic questionnaire, a questionnaire for adherence to the means of screening for breast cancer, the HADS scale, the EVA scale, and health belief scales and health control locus. Currently, in Portugal, breast cancer is the most common oncological disease, prevalence and mortality in females. The core of this problem seems to be related to the low adherence to screening behaviors, mainly influenced by the level of knowledge about the potential benefits of its prevention, health beliefs, locus of health control, and physical pain and anxiety at the time of the examination. As the main results of this scientific study, we found a statistically significant association between the variables of literacy, perceived benefits, perceived barriers and HADS in motivation for the test, socioeconomic variables and perceived severity with the frequency of subsequent screening, and we can still to verify high pain when performing the mammographic examination associated with factors such as age and anxiety/depression felt before the mammography. The data obtained contribute to a better understanding of all adherence behaviors to breast cancer screening, so that it is possible to reformulate intervention programs and improve the healthy behaviors of women, leading to changes in beliefs and locus of control breast cancer and mammography.
Yi-MingChu y 朱奕銘. "A Lagrangian Relaxation Approach to the Mixed-product Assembly Line Sequencing Problem: A Case Study of a Door-Lock Company in Taiwan". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/13054043277030493831.
Texto completo國立成功大學
交通管理學系碩博士班
100
This thesis investigates the mixed-product assembly line sequencing problem for a door lock manufacturing company in Taiwan. Companies in the door lock industry schedule their production processes to minimize their costs while meeting customer demand. The variance and diversity of lock components complicate the mixed-product assembly line sequencing problem and directly influence the material requirement planning and human resources costs. The assembly line sequencing problem of one of the largest ironware manufacturing companies in Asia, company F, is studied and an integer programming mathematical model with constraints on production lines, labor, warehouse capacity, and order fulfillment rates is formulated to minimize the total cost. A heuristic based on the Lagrangian relaxation principle is devised to solve this mixed-product assembly line sequencing problem. The efficiency of the proposed Lagrangian relaxation heuristic is evaluated by comparing its solutions with those obtained using CPLEX. The results show that the proposed heuristic solves the real-world problem almost 15 times faster than CPLEX in terms of CPU time, with equal solution quality. The salient results and practical issues involved in this unique problem are discussed in detail.