scholarly journals Tracing the Local Breeds in an Outdoor System – A Hungarian Example with Mangalica Pig Breed

2022 ◽  
Author(s):  
Márta Alexy ◽  
Tomáš Horváth

Pig farming is largely characterized by closed, large-scale housing technology. These systems are driven by resource efficiency. In intensive technologies, humans control almost completely. However, there are pig farming systems where humans have just little control. These free-range technologies are called organic pig farming systems in which the quality characteristics of the produced meat sold on a premium price are primary. We present the practical difficulties that are challenging in implementing precision pig farming. We characterize the data science methods that determine the reliability our conclusions. This chapter describes the literature on the behavior and production results of pigs, social aspects, and the possibilities of the certified pig meat supply chain. Digital solutions can be implemented to verify and trace the origin of meat products. In our project, Mangalica breeding sows were tagged with passive Radio Frequency Identification (RFID) tags, and a research zone was established at wallowing area. RFID readers record the presence of sows in this zone. In addition, temperature, humidity, and air pressure are recorded hourly for 24 hours a day. Data are analyzed using visualization and data science techniques. We present our interim results and conditions of the experiment in this chapter.

Sensors ◽  
2019 ◽  
Vol 19 (3) ◽  
pp. 663 ◽  
Author(s):  
Edoardo Giusto ◽  
Filippo Gandino ◽  
Michele Greco ◽  
Michelangelo Grosso ◽  
Bartolomeo Montrucchio ◽  
...  

Indoor thermal monitoring is a crucial requirement for home automation, which fits inside the ever-growing Internet of Things (IoT) paradigm. The IoT ecosystem aims at connecting every device exploiting specific functions, deployed in a particular place, in order to give the chance to the users to monitor and/or control some aspects of their life, or to demand this task to a proper software. In the thermal monitoring context, IoT provides new opportunities for a dense and/or large-scale distribution of sensors, which have to gather data in order to effectively control the Heating, Ventilation and Air Conditioning (HVAC) system. Several wireless technologies can be exploited for this scope. However, they involve different benefits and drawbacks. In particular, this study is focused on Radio Frequency Identification (RFID) and Bluetooth®, which represent two well-known wireless technological standards used by commercial electronics but suitable also for pervasive IoT systems. These technologies are discussed and compared from several points of view, i.e., flexibility, reliability, battery life and cost of the system. A theoretical analysis highlights their benefits for the application context and evaluates their suitability to dense and large-scale monitoring systems. The theoretical results are supported by an experimental analysis based on the implementation and test of two different systems, one using RFID and the other using Bluetooth technology.


Sensor Review ◽  
2017 ◽  
Vol 37 (3) ◽  
pp. 338-345 ◽  
Author(s):  
Yawei Xu ◽  
Lihong Dong ◽  
Haidou Wang ◽  
Jiannong Jing ◽  
Yongxiang Lu

Purpose Radio frequency identification tags for passive sensing have attracted wide attention in the area of Internet of Things (IoT). Among them, some tags can sense the property change of objects without an integrated sensor, which is a new trend of passive sensing based on tag. The purpose of this paper is to review recent research on passive self-sensing tags (PSSTs). Design/methodology/approach The PSSTs reported in the past decade are classified in terms of sensing mode, composition and the ways of power supply. This paper presents operation principles of PSSTs and analyzes the characteristics of them. Moreover, the paper focuses on summarizing the latest sensing parameters of PSSTs and their matching equipment. Finally, some potential applications and challenges faced by this emerging technique are discussed. Findings PSST is suitable for long-term and large-scale monitoring compared to conventional sensors because it gets rid of the limitation of battery and has relatively low cost. Also, the static information of objects stored in different PSSTs can be identified by a single reader without touch. Originality/value This paper provides a detailed and timely review of the rapidly growing research in PSST.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


2008 ◽  
pp. 1975-1993
Author(s):  
Katina Michael ◽  
Amelia Masters

Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland security has been drawn into the spotlight. The challenge, at both national and global levels, of managing information in order to offensively resist attack or defensively keep citizens safe from further harm has never been greater. In meeting this challenge, the tools and strategies used by relevant defensive powers are a key factor in the success or failure of all activities, ranging from small-scale, homeland security administration through to large-scale, all-inclusive war. In all areas within this wide scope, the adoption of positioning technologies has played an important role. Of special significance are the global positioning system (GPS), second-generation (2G) and beyond mobile telephone networks (includingwireless data networks), radio-frequency identification (RFID) and geographic information systems (GIS). Since most positioning technology has been developed or released for use within the commercial sector, however, concerns beyond technological feasibility are raised when applications are harnessed solely for defense. The integration between commercial and military sectors and public and private needs must be considered and, primarily, this involves ensuring that the enforcement of homeland security does not compromise citizen rights.


2020 ◽  
Vol 63 (8) ◽  
pp. 1271-1271
Author(s):  
Qianqian Su ◽  
Rui Zhang ◽  
Rui Xue

Abstract Modular exponentiation, as a fundamental operation used in many public-key cryptosystems, has always be considered to be very time-consuming. It is difficult for some devices with limited computation capability, such as mobile devices and low-cost radio frequency identification (RFID) tags, to perform large-scale modular exponentiations. In cryptosystems, one typical case of modular exponentiation is that the modulus is a composite number. For instance, in RSA algorithm, the modulus is the product of two distinct prime numbers. In this paper, we investigate how to securely and efficiently outsource composite modular exponentiations and put forward two secure outsourcing algorithms for composite modular exponentiations based on single untrusted cloud. The first algorithm, named MCExp, is designed for outsourcing single composite modular exponentiation, i.e. $u^a$ mod $N$. The second algorithm, named SMCExp, is designed for outsourcing simultaneous composite modular exponentiation, i.e. $\prod ^{n}_{i=1}u^{a_i}_{i}$ mod $N$. Different from algorithms based on two untrusted servers, the proposed algorithms are very practical because they avoid the strong assumption that there must exist two servers without collusion. The proposed algorithms not only protect the privacy of the exponent and the base simultaneously, but also enable users to verify the correctness of the result returned by the cloud with high probability. Compared with using the square-and-multiply algorithm, the user can achieve higher efficiency by using the proposed algorithms. Besides, we prove the security of our algorithms and conduct several experiments to demonstrate the efficiency of the proposed algorithms. Finally, we show that the proposed algorithms can be used to construct the secure outsourcing algorithms for Shamir’s identity-based signature and identity-based multi-signature.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Ju-min Zhao ◽  
Ding Feng ◽  
Deng-ao Li ◽  
Wei Gong ◽  
Hao-xiang Liu ◽  
...  

Radio Frequency Identification (RFID) is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP) to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.


2019 ◽  
Vol 24 (2) ◽  
pp. 142-155 ◽  
Author(s):  
Chengcheng Wang ◽  
Zhongzhi Xu ◽  
Ronghua Du ◽  
Haifeng Li ◽  
Pu Wang

2014 ◽  
Vol 596 ◽  
pp. 230-233 ◽  
Author(s):  
Dong Liang Guo ◽  
Qiao Xiang ◽  
Zhong Hua Li

Radio Frequency Identification (RFID) is a kind of short-range radio technology for data acquisition and automatic identification. In large scale application of RFID system, RFID network planning (RNP) is one of the fundamental tasks need to be fulfilled. This paper proposed an efficient hybrid intelligent optimization approach for RNP. A RNP optimization model is designed in considering of coverage, cost, and the radiated power of readers. A hybrid intelligent optimization approach is proposed to optimize the model in a hierarchical fashion. Firstly, we used the intelligent optimization algorithm to regulate the number and position of the RFID readers for the coverage and cost objective. Then, the optimal radiate power of readers is computed by analytic calculation. Experimental results show that this hybrid intelligent optimization approach has the advantage in terms of the quality of RFID network deployment and computation efficiency comparing with the existing approaches.


Sign in / Sign up

Export Citation Format

Share Document