Results 81 to 90 of about 43,693 (225)

Second‐Order Between‐Supplier Learning

open access: yesJournal of Operations Management, EarlyView.
ABSTRACT Substantial empirical evidence shows that suppliers in emerging economies can enhance their technological capabilities through direct learning from technologically advanced foreign competitors. However, suppliers in emerging markets may struggle to learn directly from knowledge about competitors’ products that are not widely available on the ...
Lisha Liu, Xianwei Shi, Guangzhi Shang
wiley   +1 more source

Optical Coherence Tomography for High‐Precision Industrial Inspection in Industry 4.0: Advances, Challenges, and Future Trends

open access: yesLaser &Photonics Reviews, EarlyView.
This review examines how optical coherence tomography transforms industrial inspection by delivering real‐time, micrometer‐resolution, depth‐resolved imaging. It surveys applications across display manufacturing, thin films, microelectronics, laser processing, and coatings, evaluates performance against conventional techniques, and highlights emerging ...
Nipun Shantha Kahatapitiya   +7 more
wiley   +1 more source

Misplaced Inventory and Lead-Time in the Supply Chain: Analysis of Decision-Making on RFID Investment with Service Level

open access: yesJournal of Applied Mathematics, 2014
Radio-frequency identification (RFID), as the key technology of Internet of Things (IoT), has been hailed as a major innovation to solve misplaced inventory and reduce lead-time. Many retailers have been pushing their suppliers to invest this technology.
Li-Hao Zhang   +3 more
doaj   +1 more source

The Integration of AI, Blockchain and IoT for the Sustainable Development of the Logistics Service Industry: Insights From a PRISMA‐Based Analysis

open access: yesSustainable Development, EarlyView.
ABSTRACT This study presents an analysis of the literature on artificial intelligence (AI), blockchain and internet of things (IoT) for the sustainable development of the service industry of freight transport and logistics service providers (LSPs).
Roberto Cerchione   +2 more
wiley   +1 more source

On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs [PDF]

open access: yes, 2012
In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated against the tag owners as adversaries. The first protocol called ROTIV is a scheme which provides a privacy-preserving ownership transfer by using an HMAC ...
Abyaneh, Mohammad Reza Sohizadeh
core   +1 more source

Analysis of Artifacts on Chipless RFID Backscatter Tag Signals for Real World Implementation

open access: yesIEEE Access, 2019
Chipless radio-frequency identification (RFID) has been studied as an alternative technique to conventional chipped RFID. However, chipless RFID tag backscatter signals are affected by motion and especially when they are attached to different objects. In
Grishma Khadka   +3 more
doaj   +1 more source

Mapping the landscape of research findings: Generalization across contexts in strategic management research

open access: yesStrategic Management Journal, EarlyView.
Abstract Research Summary Knowledge accumulation requires that we understand whether and when relationships identified in any research setting generalize to others—that is, suggesting domains where results hold (or not). Strategy scholars carefully identify how theoretical mechanisms operate in their chosen research contexts, but attend less to whether
Daniel A. Levinthal, Lori Rosenkopf
wiley   +1 more source

Preoperative Radar Localisation of Impalpable Breast and Axillary Lesions: Initial Experience in an Australian Tertiary Centre

open access: yesJournal of Medical Imaging and Radiation Oncology, EarlyView.
ABSTRACT Introduction Image‐guided radar localisation (RL) is a wire‐free alternative to hookwire localisation (HWL) for preoperative localisation of impalpable breast and axillary lesions, with potential logistical and technical advantages. This study assesses clinical utility, accuracy of placement and surgical oncologic outcome metrics for RL using ...
Grace Carpenter   +8 more
wiley   +1 more source

Efficient and Low-Cost RFID Authentication Schemes [PDF]

open access: yes, 2011
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme.
Miyaji, Atsuko   +2 more
core   +1 more source

Fully Printed Flexible Single-Chip RFID Tag with Light Detection Capabilities

open access: yesSensors, 2017
A printed passive radiofrequency identification (RFID) tag in the ultra-high frequency band for light and temperature monitoring is presented. The whole tag has been manufactured by printing techniques on a flexible substrate.
Aniello Falco   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy