Applied Mechanics and Materials Vols. 263-266

Paper Title Page

Abstract: Domestic Drop and Pull Transport Mode exists several problems like slow development, disordered organization and low degree of informatization, which making the low efficiency of transportation management. This paper design an intelligent system which is based on IOT technology to realize the cargo tracking, intelligent traffic, logistics information service and carry on a visualization logistics operation service through the whole cargo flow. Finally realize the synergy between intelligent storage and intelligent transport, improve the logistics service.
2865
Abstract: This study combines quantitative and qualitative data and explores the key factors affecting radio frequency identification (RFID ) adoption decision making in hospitals in Taiwan. RFID is not merely information technology; instead, it is closely related to behavior and organization culture (Ngai, Cheng, Au, & Lai, 2007). Three dimensions, i.e., technology, organization and environment, are discussed in this study to identify key factors of RFID adoption. For researchers, this study can serve as a reference for future studies regarding RFID adoption in hospitals; for practitioners, this study provides a comprehensive overview for the government and RFID solution providers with respect to the decision making of RFID adoption in hospitals.
2872
Abstract: As various ubiquitous computing technologies become applied into many smart space systems, most museums attempt to use these techniques for their own domain. Near Field Communication(NFC) is one of wireless technologies primarily used for short range communication between smart phones and similar devices, supporting a variety of information exchange services in some effective way. In this paper, we present a new user similarity-based contents recommendation service to improve the counterpart of our previously developed museum viewing system by using NFC. In order to satisfy this goal, this service utilizes similarity of artifact attached NFC tagging patterns of users. Its desirable feature enables users to actually find and obtain their favorite contents by systematically consulting the tastes of the other users very close to those of the first. Also, the proposed system may considerably reduce overloading on contents providing servers by having smart phone clients get certain parts of basic artifact related contents information directly through NFC tags, not the servers.
2876
Abstract: In recent years, the technology of RFID developed rapidly, and has been used more and more widely. In this paper, using the Texas Instruments semiconductor chip of TRF7960 and the single-chip microcomputer of PIC16F877, a new design scheme of RFID reader is proposed, which conforms to ISO/IEC 15693 standard. The reader operates in 13.56MHz and can identify the tags in about fifteen centimeters. The hardware design and the software flow are provided in detail. Test results present that the functions of anti-collision and multiple tag identification are supported in this reader, it has high accuracy ratio when reading and writing tag.
2881
Abstract: In order to solve the problems of lack of design flexibility, not easy to self-development and involving the intellectual property rights, when adopting special RFID chips in the design of ultra-high frequency radio frequency readers, in this paper, based on analysis of the communication signal interface of protocol ISO/IEC 14443 TYPE A, a trial-and-error method for realization of sending the data with Modified Miller code is put forward, and a new decoding method for Manchester is designed, by combining a RFID analog front end(AFE), the RFID reader can be easily developed. Test results present that the coding and decoding methods can well meet the requirements of ISO/IEC 14443 TYPE A, with high efficiency, stability and accuracy rate.
2885
Abstract: In order to avoid potential traffic dangers, as well as to prevent the occurrence of traffic accidents, this paper manages to build a traffic safety early warning system by using Technology of Internet of Things. First, this paper has a general review of related researches. Then, it analyzes basic structures of intelligent traffic safety early warning systems based on Technology of Internet of Things, and establishes data collection and calculation model for traffic flow, following with analysis of traffic safety early warning and responding technologies. Finally, this paper conducts a simulation analysis, the results of which indicate that the said method proposed by this paper has a better robustness.
2890
Abstract: In order to obtain the remote environmental parameters, The SHT10 digital humidity and temperature sensor, and the TSL2561 light-to-digital converter were used to get the environmental parameters such as the temperature, the humidity and the luminance. The two sensors were controlled by the microprocessor MCS-51. The Internet of Things (IOT) technology was used to transform the parameters data to the remote server through the GPRS network, and the SIM900 chip was opted to accomplish GPRS function. The Ajax and the mobile platform were combined to make sure that the environment data on the server can be easily accessed. By using Ajax in the web application, the time to reach the information reduced a lot, and there were no more geographical restrictions because of the Mobile Platform application.
2895
Abstract: A watermark algorithm based on HVS in DCT domain is proposed. The original host image is scrambled with magic transform and divided into blocks and manipulates by DCT. The original image’s DCT coefficients can equably distribute in the coefficients matrix. The binary image is divided into 2×2 blocks before embedding the watermarking. Those blocks are random sequenced by the pseudorandom sequence, and then the watermarking image is scrambled by Arnold. The theory of HVS is used to decide the embedding strength under low distortion, which efficiently enhances the robustness of watermarking. The two basic factors of watermarking are robustness and invisibility. The key techniques which affect them are the means we choose to carry out digital watermarking and the watermarking structure we use.
2901
Abstract: The revocation of delegated rights and anonymity of proxy signer are essential issues of the proxy signature schemes. Based on the bilinear pairings, an anonymity-revoking proxy signature scheme was proposed. In this scheme, when an original signer found that a proxy signer was malicious or the delegation period was expired, he/she could revoke the malicious proxy signer’s signing capability efficiently through a trusted authority. On the other hand, only the signature from delegation of the original signer could be confirmed by the verifier and the identity of the proxy signer could not be known to the verifier. In appearing of disputation, the verifier could reveal the real identity of the proxy signer with the help of the original signer. This scheme can protect not only the original signer’s benefit but also the proxy signer s privacy.
2906
Abstract: How to build a school bus safety regulatory system consistent with China by using internet of vehicle technology was discussed in the concept of intelligent application and design. The system which was based on vehicle intelligent networking technology provided a reliable system to protect the safety supervision of the school bus. The composition and function of two ingredients of the school bus safety regulation system as the 3G bus intelligent vehicular terminal and the high-speed moving objects data acquisition sensor platform were amply introduced.
2911

Showing 551 to 560 of 680 Paper Titles