4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdbsabb_bb60/originalityReport?attemptId=843e379c16f3486ca59d9be3a871abde&includeDeleted=true&course_… 1/11
DEPT.SSC.SAFEASSIGN SSC TUTORING SAFEASSIGN 20152016
Draft SafeAssignment 35
Akshay Kotla on Sat, Apr 23 2016, 1:42 PM
42% highest match
Submission ID: 843e379c16f3486ca59d9be3a871abde
Citations (10/10)
Running Head:
Word Count: 2,164
Attachment ID: 121475621
rfid_in_mobile_manufacturing_…
42%
1 Another student's paper
2 http://www.knetbooks.com/foundationslodgingmanagement1st
hayes/bk/9780131700550
3 Another student's paper
4 Another student's paper
5 Another student's paper
6 Another student's paper
7 ProQuest Document
8 Another student's paper
9 Another student's paper
10 http://www.ukessays.com/essays/business/theprocessof
improvingtheflowofmaterial.php
http://safeassign.blackboard.com/
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_423338_1&paperId=121475621&&attemptId=843e379c-16f3-486c-a59d-9be3a871abde&course_id=_423338_1
http://www.blackboard.com/docs/documentation.htm?DocID=191SafeAssign000en_us
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReportText?paperId=119946982&course_id=_423338_1
http://www.knetbooks.com/foundations-lodging-management-1st-hayes/bk/9780131700550
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReportText?paperId=117204141&course_id=_423338_1
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/proquestPaper?paperId=7355947&mac=1AB165FDE0FC4B05E936DBD2CCEE451B&course_id=_423338_1
http://www.ukessays.com/essays/business/the-process-of-improving-the-flow-of-material.php
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdbsabb_bb60/originalityReport?attemptId=843e379c16f3486ca59d9be3a871abde&includeDeleted=true&course_… 2/11
1 RFID IN MOBILE MANUFACTURING INDUSTRY 1 RFID IN MOBILE
MANUFACTURING INDUSTRY 10
MOBILE PHONES MANUFACTURING INDUSTRY
Student’s Name
Professor’s Name
Course Title
Date of Submission Mobile Phones Manufacturing Industry
2 TABLE OF CONTENTS
3Executive summary
Introduction 3 The problem of my industry 3 General description of the business
problem 3 Overview of RFID (Basics/Advances) 4 Business Justification Business
Process Integration (BPI) 4 Benefits and Disadvantages 5 Benefits 5 Disadvantages 5
planning 6 Security Concerns 6 Purchasing 7 Installing 7 Impact of Implementation
8 Description of administrative procedures 8 Changes in Organization Policies or
Enhancements 8 Training requirements 8 Maintenance of the system 9 conclusion 9
References 10
1 MOBILE PHONES MANUFACTURING INDUSTRY
Executive summary
Introduction
1 THE RFID IS ONE OF THE MANY TECHNOLOGIES THAT HAVE
BEEN EXISTING SINCE THE TIME MEMORIAL. THE TECHNOLOGY
WAS INNOVATED AND IMPLEMENTED TO ENSURE THAT THERE
4/23/2016 SafeAssign Originality Report
https://wilmu.
2. t-
hayes/bk/9780131700550
3 Another student's paper
4 Another student's paper
5 Another student's paper
6 Another student's paper
7 ProQuest Document
8 Another student's paper
9 Another student's paper
10 http://www.ukessays.com/essays/business/the-process-of-
improving-the-flow-of-material.php
http://safeassign.blackboard.com/
https://wilmu.blackboard.com/webapps/mdb-sa-
bb_bb60/originalityReportPrint?course_id=_423338_1&paperId
=121475621&&attemptId=843e379c-16f3-486c-a59d-
9be3a871abde&course_id=_423338_1
http://www.blackboard.com/docs/documentation.htm?DocID=19
1SafeAssign000en_us
https://wilmu.blackboard.com/webapps/mdb-sa-
bb_bb60/originalityReportText?paperId=119946982&course_id
=_423338_1
http://www.knetbooks.com/foundations-lodging-management-
1st-hayes/bk/9780131700550
https://wilmu.blackboard.com/webapps/mdb-sa-
bb_bb60/originalityReportText?paperId=117204141&course_id
=_423338_1
https://wilmu.blackboard.com/webapps/mdb-sa-
4. ification - Business
Process Integration (BPI) 4 Benefits and Disadvantages 5 Benef
its 5 Disadvantages 5
planning 6 Security Concerns 6 Purchasing 7 Installing 7 Impact
of Implementation
8 Description of administrative procedures 8 Changes in Organi
zation Policies or
Enhancements 8 Training requirements 8 Maintenance of the sys
tem 9 conclusion 9
References 10
1 MOBILE PHONES MANUFACTURING INDUSTRY
Executive summary
Introduction
1
THE RFID IS ONE OF THE MANY TECHNOLOGIES THAT
HAVE
BEEN EXISTING SINCE THE TIME MEMORIAL. THE TECH
NOLOGY
WAS INNOVATED AND IMPLEMENTED TO ENSURE THAT
THERE
4/23/2016 SafeAssign Originality Report
5. https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 3/11
EXIST A TECHNOLOGY THAT WOULD ENSURE SECURITY
,
EFFICIENCY, AND TIME SAVING. THE TECHNOLOGY HAS
BEEN
SEEN RELEVANT IN MANY COMPANIES AND ITS IMPACT
FELT AND
ACCEPTED BY ALL. THEREFORE, THIS RESEARCH PAPER
WILL TRY
TO EXPLAIN THE DIFFERENT WAYS IN WHICH THE RFID
HAS BEEN
ESTABLISHED AND USED IN MOBILE MANUFACTURING I
NDUSTRY
TO DETECT COUNTERFEIT MOBILE PHONES.
3 WHAT IS THE PROBLEM IN MY INDUSTRY?
4
MASS PRODUCTION OF MANY FAKE MOBILE PHONES IN
THE
WHOLE WORLD
General description of the business problem
For over an extended period, Mobile Manufacturing Industry ha
s faced many
6. challenges, among them being the prominent issue of counterfei
ts. 4 THERE
HAS BEEN A MASS PRODUCTION OF MANY FAKE MOBIL
E PHONES
IN THE WHOLE WORLD. THERE ARE MANY CHINESE CO
MPANIES
WHICH HAVE COME UP AND WITH LITTLE CAPITAL, THE
Y HAVE
BEEN ABLE TO PRODUCE AND DISTRIBUTE SOME COUN
TERFEIT
PRODUCTS IN THE WHOLE WORLD(RIZWAN ET AL., 2014
).
THESE MOBILE PHONES PRODUCTS USUALLY HAVE THE
SAME
DESIGN AS THE ORIGINAL PRODUCTS. THEY ARE ALSO
GIVEN
NAMES THAT CAN CONFUSE THE UNSUSPECTING BUYE
RS. THE
OTHER KEY IMPORTANT THING ABOUT THESE PRODUCT
S IS THAT
THEY ARE USUALLY SOLD TO THE MARKET AT RELATI
VELY LOWER
PRICES AS COMPARED TO THE ORIGINAL MOBILE PHON
ES.
7. Overview of RFID (Basics/Advances)
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 4/11
1
IN MOBILE MANUFACTURING INDUSTRY, RFID IS USED
BEFORE
AND DURING THE MANUFACTURING PROCESS IN THE G
OODS
APPLICATION FOR EXAMPLE. DURING MANUFACTURIN
G, THE RAW
MATERIAL IS INPUTTED INTO THE SYSTEM USING A CA
SE KNOWN
AS THE PALLET-LEVEL RFID. THE FOLLOWING MATERIA
L THAT
FOLLOWS IS THE TRACKING MATERIAL THAT IS CODED
TO
DETERMINE WHETHER THE MANUFACTURING SET IS PO
SSIBLE.
THE MONITORING EQUIPMENT IDENTIFIES THE ITEMS T
HAT PASS
8. THE CRITICAL STEP IN THE PRODUCTION PROCESS. THE
REAL-
TIME INFORMATION OBTAINED IS USED THE BRAND OW
NERS EASY
TO TRACK DOWN THE MANUFACTURING PROCESS(LEE,
KIM, KIM, &
PARK, 2010).
THE RFID GIVE ACCURATE RECORDS THAT CAN BE USE
D FOR
FUTURE PLANNING AND BUDGETING. THE RECORDS AR
E ALSO
USED TO MINIMIZE ERRORS SINCE THE INFORMATION O
BTAINED
CAN BE USED TO IDENTIFY WHERE THE PROBLEM OCCU
RRED IN
THE PAST THE COMPANY CAN CORRECT THEM AND TH
US COMING
UP WITH THE BEST QUALITY MOBILE PHONES. THE RFI
D IS ALSO
USED IN COUNTERFEIT DETECTION. THE RFID IS USED T
O
GENERATE IDS THAT THEY FEED TO THE GENUINE ITEM
. THE IDS
SUPPLIED TO THE CERTAIN DEVICES ARE USED TO DET
9. ECT THE
ACTUAL DEVICES IN THE MARKET AND TO TURN DOWN
ANY
COUNTERFEIT MOBILE PHONES.
Business Justification - Business Process Integration (BPI)
4
MOBILE MANUFACTURING INDUSTRY CAN INTEGRATE
AND USE
THE RADIO FREQUENCY IDENTIFICATION TECHNIQUES
AND
MOUNT THE SMALL CHIPS IN THE PHONES. THIS COMPA
NY CAN
ALSO USE THE TECHNOLOGIES IN THE DIFFERENT SPAR
E PARTS OF
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 5/11
THE MOBILE PHONES THAT THEY HAVE PRODUCED SO
THAT THEY
CAN BE EASILY DISTINGUISHED FROM THE FALSE ONES
THAT ARE
10. CONTINUING TO CIRCULATE IN THE MARKETS(SARI, 201
0). THIS
WILL MAKE IT EASIER FOR THE IDENTIFICATION OF TH
E
COUNTERFEIT MOBILE PHONES IN THE MARKET MOBIL
E
MANUFACTURING INDUSTRY SHOULD SUBSEQUENTLY
HAVE
THEIR REPRESENTATIVES IN THE DIFFERENT MARKETS
WHO ARE
SERVING THE PURPOSE OF ASSISTING IN THE IDENTIFIC
ATION OF
THE PRODUCTS.
3 BENEFITS AND DISADVANTAGES
Benefits
4
THE RFID TECHNOLOGY HAS MADE IT EASIER FOR THE
DISTINCTION TO BE DRAWN BETWEEN THOSE ORIGINA
L
PRODUCTS AND THE COUNTERFEIT ONES. THIS IS THE S
URE WAY
THAT THE MOBILE MANUFACTURING INDUSTRY CAN T
AKE
11. ADVANTAGE OF THE TECHNOLOGY AND INCORPORATE
IT WITH
THE AIM OF ENSURING THAT THEY CONTROL ALL THE
GOODS
THAT ARE PRODUCED IN THE MARKET(CLARKE-HILL, H
ILLIER, &
COMFORT, 2005). THE COMPANIES CAN ALSO LIAISE WI
TH
DIFFERENT GOVERNMENTS WHO SO THAT THEY ASSIST
THEM IN
BLOCKING THE COUNTERFEIT GOODS FROM BEING SPR
EAD IN THE
MARKETS.
MOBILE MANUFACTURING INDUSTRY CAN TAKE ADVA
NTAGE OF
THIS TECHNOLOGY SINCE IT IS THE ONLY PROMISING
WAY OF
MAKING IT EASIER FOR THE IDENTIFICATION AND CON
TROL OF
THE SPREAD AND CONSUMPTION OF THE COUNTERFEIT
MOBILE
PHONES BY THE CONSUMERS WHO ARE UNSUSPECTING.
12. 4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 6/11
Disadvantages
However, the use of RFID technology has also some challenges
to the user or the
company that wants to implement it. RFID has a lot of technical
, ethical, and privacy
problems. Many businesses in the world have performed differe
nt types of RFID
devices that some even do not meet the global standards. Some
of the RFID devices
are not meant to leave their network this makes it difficult for c
ompanies and
consumers to share these devices. Similarly, RFID is faced with
a problem of tag and
reader collision when there is signal overlapping from two or m
ore readers.
Furthermore, RFID device does not have the ability to differenti
ate between many
users which can allow unauthorized people to view the content y
our items which are
meant to be privacy. Moreover, RFID is designed to read origin
13. al product from a
distance, and privacy issues cannot be maintained as people can
use a high-gain
antenna(Glasser, Goodman, & Einspruch, 2007).
Planning
Planning of the RFID communication system to detect first mob
ile phones from
counterfeit mobile phones in the market is imperative. Firstly, p
lanning involves
setting goals and objectives of the need of choosing the RFID pr
ogram. Besides, the
plan also includes the statement of the interference of the enviro
nmental factors
such as mutual coverage and other multiple readers. Signals fro
m the tags towards
the readers must be taken into consideration the so-called uplink
and traditional
cellular networks.
Furthermore, planning of RFID demands the companies in the m
arket to evaluate
and identify right applications of the RFID plan and deployment
s in the market. To
determine the counterfeit mobile phone, businesses in the marke
14. t are advised to
plan for quality standards, team building, vendor selection, eme
rging technologies,
integration, and infrastructure that is required.
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 7/11
Security Concerns - (Privacy/Middleware/Information Safekeepi
ng/Data Access,
Transition & Operations, Authentication & Authorization –
user ID/password
Data security is critical issues that must be addressed in details
from both the
business and technical point of view so as minimize the increase
of ubiquity of RFID
technology. Most importantly, the RFID security program must
meet demands from
the users and the public so as to maintain their privacy. RFID is
faced by security
threats from unauthorized readers, side channel attacks as well a
s the clone or rogue
15. tags. Maintaining of security programs of RFID involves the co
ntribution of all the
stakeholders from consumers, government, corporations, and RF
ID solution
providers(Sari, 2010). Data security can be solved by the use of
Generation two
protocol which has the ability uses tag pseudonyms, strong data
encryption, strong
password protection as well as tag reader authentication.
Similarly, there have been advancements of current data securit
y strategies by
Generation mostly due to technological advancements. RFID tec
hnology typically
helps to end up with maximum security by using back-end and f
ront-end security
measures. Back and front end security plans uses industry based
standard network
technology and using information pointers instead of actual info
rmation
respectively.
Purchasing
Before purchasing a RFID system, there are many features one s
hould look at
16. especially because of the task the system is intended to perform.
Purchasing RFID
software involves many activities such as network infrastructure
installation, data
management, hardware installation like antennas and readers as
well as the cost of
middleware items and products. RFID system should be selected
properly because
poor selection can affect the efficiency of counterfeit detection
of mobile phones.
RFID system purchased must be able to perform its work efficie
ntly should be
reliable (Tag Singulation) such as tens, hundreds, or thousands.
Tag sensitivity of
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 8/11
RFID system should be considered when one is buying the syste
m; the sensitive
nature of RFID system improves the performance and data inter
polation. A RFID
system selected to be purchased should have interference tolera
17. nce from other
readers in the same environment so as to minimize the interfere
nce of its
performance by other readers.
Installing
Installation of RFID reader involves some processes. Tags are u
sually attached to all
products and mobile phones that are to be tracked. The cards, w
hich are mostly
made from pure tag-chip (integrated circuit), connected to the a
ntenna(Want,
2006). Antenna readers of the RFID system are typically built fr
om different types of
tags like labels, security tags, apparel hang tags, asset tags from
the industries.
Furthermore, card chip has the memory system which typically
keeps the items or
the mobile’s Electronic Product Code (EPC). More so, tag chip
also stores other
useful information that makes it possible for the mobile device t
o be tracked by
RFID reader or read it from different areas with the help of inte
rnet connection.
18. Impact of Implementation – type of shipping/nation/worldwide
3 DESCRIPTION OF ADMINISTRATIVE PROCEDURES –
HUMAN AND
PROCESS CHANGES
Mobile Phones Manufacturing Industry has Administrative proc
edures in help to set
rules and policies that eventually enable the company to manage
its performance.
Administrative procedures enable organization and workers to b
e efficient,
responsible, and accountable as well as more consistencies.
3
CHANGES IN ORGANIZATION POLICIES OR ENHANCEME
NTS
With the use of RFID system technologies, companies are force
d to change their
organizational policies and strategies so as to enhance the perfo
rmance of the
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 9/11
19. scheme. Businesses or organizations are supposed to come up w
ith specialized RFID
task force which is responsible for defining, designing, and plan
ning RFID
strategies. Long-term strategies and policies must be developed
so that labor costs
and increased customer satisfaction can be achieved in future.
Training requirements
Implementation of RFID requires educating those people (worke
rs and consumers)
who are going to be involved in the implementation process. Bo
th industry analysis
and publication can help to create awareness of the importance
of using RFID
system technology to detect counterfeit mobile phones. Industry
conferences can
contribute to spreading the knowledge of RFID technology, and
government can
also educate people on the financial loss that is created by count
erfeit businesses.
Workers must be trained on any new software of devices that ha
s been introduced
into the firm processes by the management. Training employees
also ensure that
20. RFID strategies successively meet the organization's objectives
and reduce
operational risks.
Maintenance of the system –
Information Layer (storage), & Decoupling (field
maintenance).
Support of any software or devices is paramount so as to increas
e their durability
and working efficiency. Sometimes, lab management can be con
structed so as to
store RFID system. Information stored in RFID system should b
e stored properly so
as to minimize loss or cost of retrieving information. Devices in
the field should be
protected well to reduce blockage and unauthorized persons(Wa
nt, 2006). More
advanced storage of information should be developed such as w
eb-based or internet
information management. Working conditions of the RFID syste
m in the field
should be well studied because of their high standards which ca
n demand high
working conditions. Lastly, integrating much technological adva
21. ncement in storage
and handling of RFID system enables convenience and effective
ness of information
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course… 10/11
management as well as flow.
Conclusion
4
RESEARCH HAS REVEALED THAT THE USE OF RADIO FR
EQUENCY
IDENTIFICATION CAN ASSIST MUCH IN AN ATTEMPT TO
SOLVE THE
PROBLEM AND KEEP THE CONSUMERS SAFE FROM BEIN
G CONNED
INTO GETTING AND UTILIZING MOBILE PHONES THAT A
RE
COUNTERFEIT.
References Clarke-Hill, P. J. 5
AND C., HILLIER, D., & COMFORT, D. (2005).
6 THE BENEFITS, CHALLENGES AND IMPACTS OF RADIO
22. FREQUENCY IDENTIFICATION TECHNOLOGY (RFID) FOR
RETAILERS IN THE UK. MARKETING INTELLIGENCE & P
LANNING,
23(4), 395–402. 7
HTTP://DOI.ORG/10.1108/02634500510603492
Glasser, D. J., Goodman, K. W., & Einspruch, N. G. (2007). Chi
ps, tags and
scanners: 1
ETHICAL CHALLENGES FOR RADIO FREQUENCY
IDENTIFICATION. Ethics and Information Technology.
http://doi.org/10.1007/s10676-006-9124-0
Lee, D., Kim, S., Kim, H., & Park, N. (2010). Mobile platform f
or networked RFID
applications. In ITNG2010 - 7th International Conference on Inf
ormation
Technology: New Generations (pp. 625–630).
http://doi.org/10.1109/ITNG.2010.188
Rizwan, M., Ali, A., Anjum, H., Naseer, M., Majeed, Z., Ali, M.
A., & Anwar, A.
(2014). Consumer’s Purchase Intention towards Counterfeit Mo
bile Phones. Journal
of Public Administration and Governance, 4(3), 75–89.
23. http://doi.org/10.5296/jpag.v4i3.5850
Sari, K. (2010). 8
EXPLORING THE IMPACTS OF RADIO FREQUENCY
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course… 11/11
IDENTIFICATION (RFID) TECHNOLOGY ON SUPPLY CHAI
N
PERFORMANCE. 9
EUROPEAN JOURNAL OF OPERATIONAL
RESEARCH, 207(1), 174–183. 8
HTTP://DOI.ORG/10.1016/J.EJOR.2010.04.003
Want, R. (2006). 10
AN INTRODUCTION TO RFID TECHNOLOGY. IEEE
Pervasive Computing. http://doi.org/10.1109/MPRV.2006.2
Stat170 - Introductory Statistics
Semester 1, 2015 Assignment 2
Due Wednesday 20th May, 5.00pm via the iLearn link only
24. Submit via the Assignment 2 link in the ASSESSMENTS area of
iLearn.
Instructions:
1) The answers to all questions are to be word processed into
this document. You can either type formulae into your solution
or you can use the equation editor in Word or you may include
hand-written equations and diagrams by photographing them so
that you have the image saved as a picture file and then pasting
(inserting) the image/s into your solution.
2) Your assignment should be uploaded as a Word (.doc or
.docx) or PDF file (created from a Word processed document)
ONLY. Other formats, including a PDF created from an image,
will not be accepted by the system.
3) Please note that iLearn is fairly reliable, but, like any
website, it is occasionally unavailable for short periods.
Therefore, do not wait until the due date/time to start trying to
submit your work. If you have technical difficulties in
submitting your Assignment, it is your responsibility to ensure
these difficulties are resolved by the submission deadline. (The
University has Help services to support you in the event of a
problem; see http://ilearn.mq.edu.au/login/MQ/help.htm.)
4) No submissions will be accepted by email or other means.
5) When you think you have submitted your Assignment, please
check to make sure that you have submitted the correct file: In
iLearn, click on the Assignment, and you should see your
uploaded files.
6) This Assignment is worth 12% of your total grade for
STAT170. You may discuss the Assignment with your
classmates if you wish, but must then complete all of the
calculations and writing by yourself. Note: every semester,
several students receive a mark of 0 for this Assignment, due to
plagiarism. Ensure that you do not copy parts of your friends'
Assignment submissions. Submitting your assignment via
25. iLearn is a declaration that the work is your own.
Information:
This assignment is worth 12% and is marked out of 45.
Penalties apply as follows:
Submitted on Wednesday after 5pm: Deduct 10 marks
Submitted on Thursday: Deduct 15 marks
Submitted on Friday: Deduct 25 marks
No assignments submitted after Friday will be accepted.
Q1
Q2
Q3
Q4
Total
12
15
8
10
45
7) Question 1 (12 marks)
The times taken to assemble a car in a manufacturing plant
follow a normal distribution with a mean of 20 hours and a
26. standard deviation of 2 hours. Use this information to answer
the following questions. Show your working, including an
appropriate diagram.
a. Find the probability that a randomly selected car takes
between 21 and 24 hours to assemble.
b. Find the probability that the average assembly time for a
randomly selected sample of 5 cars manufactured in the plant
will be longer than 22 hours.
27. c. 69% of new cars purchased in Australia have automatic
transmission. Find the probability that less than 40 new cars
from a random sample of 50 have automatic transmission.
Question 2 (15 marks)
In 2013, a study of 50 cruise ships was undertaken to
investigate the variables which determine the crew size of a
cruise ship. For each of the 50 cruise ships, information was
recorded on their most recent cruise.
Some of the variables recorded on each cruise ship are
described below.
Variable Name Variable Description
Ship Name of cruise ship
Age Age of the cruise ship in years as of 2013
Cabins Number of cabins
Passengers Number of passengers on most recent cruise
Crew Number of crew on most recent cruise
The following output was constructed from information
recorded on the age and the crew size of the 50 cruise ships in
the study. Consider this output for parts a. to f.
28. Regression Analysis: Crew versus Age
Model Summary
S R-sq R-sq(adj) R-sq(pred)
235.954 49.67% 48.62% 45.38%
Coefficients
Term Coef SE Coef T-Value P-Value VIF
Constant 1301.3 87.2 14.92 0.000
Age -35.74 5.19 -6.88 0.000 1.00
Regression Equation
Crew = 1301.3 - 35.74 Age
Question 2 continued
a. Comment on the relation between the age of a cruise ship and
the number of crew employed on the ship:
b. Did the oldest cruise ship have the largest crew size?
c. What was the approximate age and crew size of the oldest
cruise ship?
29. d. 6 of the cruise ships were 12 years old. What was the
approximate crew size of the 12 year old ship with the smallest
crew size?
e. The 12 year old cruise ship with the smallest crew size had
the largest residual. Calculate the approximate value of this
residual, using your results from part d.
f. Write down one reason (referring specifically to relevant part
of the output on the previous page) why a linear model may not
be a good model for predicting the number of crew required on
a cruise ship from the age of the cruise ship:
30. Question 2 continued
Now consider both the number of cabins and the number of
passengers as possible predictors of the crew size. The
following output was constructed from the 50 cruise ships in the
sample. Use this information for the remainder of Question 4.
Crew vs Cabins:
Regression Analysis: Crew versus Cabins
Model Summary
S R-sq R-sq(adj) R-sq(pred)
81.3511 94.02% 93.89% 93.52%
Coefficients
Term Coef SE Coef T-Value P-Value
Constant 96.6 26.3 3.67 0.001
Cabins 0.7791 0.0284 **** *****
31. Crew vs Passengers:
Regression Analysis: Crew versus Passengers
Model Summary
S R-sq R-sq(adj) R-sq(pred)
94.2836 91.96% 91.80% 91.15%
Coefficients
Term Coef SE Coef T-Value P-Value
Constant 118.3 29.9 3.95 0.000
Passengers 0.3726 0.0159 23.44 0.000
Question 2 (continued)
g. Carry out an appropriate hypothesis test, using any relevant
information from the previous page, to answer the following
research question. (You should comment on any test
assumption/s but you can assume that assumption/s are
reasonably well satisfied.)
Research Question: Is the number of cabins on a cruise ship a
useful predictor for the crew size?
Hypothesis Test:
32. h. Now consider the following research question:
Research Question: Is there a significant linear relation between
the number of passengers on a cruise ship and the crew size
required?
Calculate a 95% confidence interval to estimate the population
slope of the line which relates the number of passengers and the
33. crew size of a cruise ship. Interpret your interval in order to
answer the research question. Note that the assumptions are
satisfied for this linear model (see scatter plot and residual
plots) – you do not need to comment on these here).
i. Confidence Interval:
ii. Conclusion:
.
Medical researchers carried out a study to compare various
methods of pain relief for patients suffering different types of
pain. 115 patients who took part in this study to test the
effectiveness of slow release ‘pain patches’ applied directly to
the skin. 52 of these subjects suffered from chronic back pain
while the other 63 subjects were chronic migraine sufferers.
Each subject had pain scores recorded before and again 2 hours
after applying the ‘pain patch’ to the skin. Pain scores were a
self-assessed score out of 10. A score of 0 indicated no pain and
a score of 10 would indicate the most extreme possible pain.
Questions 3 to 5 are based on this study.
Variable Description
ID ID number for patient
Condition Medical Condition: 1 = Back pain, 2 =
Migraine
PainScoreBefore Self-assessed pain score before
pain patch treatment applied
PainScoreAfter Self-assessed pain score 2 hours after
pain patch treatment applied
Question 3 (8 marks)
Using appropriate parts of the following output which was
constructed using the results of this study to carry out a
34. hypothesis test in the space provided on the following page to
answer this research question:
Research Question: Do self-assessed pain scores two hours
after applying pain patches differ, on average, between patients
suffering back pain and patients suffering with migraine.
Descriptive Statistics: PainScoreAfter_Back,
PainScoreAfter_Migraine
Variable N Mean SE Mean StDev Minimum
Median Maximum
PainScoreAfter_Back 52 5.933 0.155 1.116 3.500
6.000 8.500
PainScoreAfter_Migraine 63 4.999 0.118 0.938 3.000
5.000 7.000
35. Question 3
Hypothesis Test:
Question 4 (10 marks)
Research Question: Is there a significant change in self-assessed
pain scores two hours after applying ‘pain patches’ to the skin
for migraine sufferers?
a. The file, PainScores.mtw, which is available on iLearn,
contains some of the data from the study described on page 6.
Use these data to carry out an appropriate hypothesis test to
answer this research question above.
b. Copy and paste appropriate Minitab output for this test, along
with appropriate graphical summaries onto the following page.
All Minitab output should be neatly presented and clearly
labelled. Marks will be deducted for summaries which do not
have appropriate titles and labels.
c. Write a report addressing the research question above on the
page provided. Refer to the document ‘A Guide to Report
Writing’ and, in particular, to the section headed ‘A Short
Guide to Report Writing for STAT170 students’ which is
36. provided on iLearn. Your report should be based on the results
of an appropriate hypothesis tests as directed in this guide.
Your report not exceed one A4 page and should be word-
processed and presentedon the page provided. It should include
the following headings:
Introduction
Methods
Results
Conclusion
Assignment 1
8
STAT170 Assignment 2 Session 1 2015
2000-200-400-600
14
12
10
8
6
4
2
0
Residual
F
r
e
q
u
e
n
c
41. 6
5
4
3
D
a
t
a
Boxplot of PainScoreAfter_Back, PainScoreAfter_Migraine
403530252015105
1400
1200
1000
800
600
400
200
0
Age
C
r
e
w
Scatterplot of Crew vs Age
120010008006004002000
400
200
0
-200
-400
-600
Fitted Value
R
e
s
i
42. d
u
a
l
Versus Fits
(response is Crew)
Running Head: MOBILE PHONES MANUFACTURING
INDUSTRY 1
MOBILE PHONES MANUFACTURING INDUSTRY
2
Mobile Phones Manufacturing Industry
43. Introduction
The use of the RFID is a technique that is not new. It had been
used as early as during the world war two. This technique has
been received positively by the different firm since it assists in
the process of management and conducting of their businesses.
THE EXECUTIVE SUMMARY ON THE INDUSTRY AND THE
BUSINESS PROBLEM THAT IS TO BE SOLVED
Mobile phones manufacturing industry
For over a long period of time, the mobile phones
manufacturing industry has faced some challenges. Among them
being the prominent issue of counterfeits. There has been a
mass production of many counterfeit mobile phones in the
whole world. There are many Chinese companies which have
come up and with little capital, they have been able to produce
and distribute some counterfeit products in the whole world.
These products usually have the same design as the original
products. They are also given names that can confuse the
unsuspecting buyers. The other key important thing about these
products is that they are usually sold to the market at relatively
lower prices as compared to the original mobile phones
(Motorola.com, 2007).
These companies that are involved in the making of the phones
also tend to use technology that resembles to a much extent the
ones that are used by the companies that deal with the
manufacture of genuine mobile phones such as the Apple
Company which manufactures IPhones.
The IPhones have their counterfeit in the market, and they go by
the name Hi-Phone. This means that an unsuspecting customer
will buy the phone thinking that it is that which has been made
by the Apple Company. The majority of these mobile phones are
also complaining of being given substandard products.
These counterfeits in most cases are usually made of low-
quality technology and as a result, they are also among the
products with the poorest qualities. The production and
distribution of the counterfeit products have brought a lot of the
negative consequences to the industry as a whole
44. (Motorola.com, 2007).
To start with, a lot of revenue is always lost to those companies
which produce and sell the counterfeit products. It also
contributes much to reducing the amount of income that the
companies such as the Apple Company which produces genuine
products get from the sale of their goods.
Such loss of revenue makes it difficult for some of the
companies to fully operate and can even lead to other companies
falling out of the business.
The other effect of the sale of the counterfeit goods is that since
the home companies are reducing the amount of revenue that
they get from the sale of their products, they are likely to not to
provide better services to their employees, and at times, they
are likely to kick out some of them.
The industries which have been thriving for a long time is now
facing numerous counterfeit problems that have made even
some of them to think about investing in other things and to shy
totally away from the manufacture of mobile phones.
Research has however revealed that the use of Radio Frequency
Identification can assist much in an attempt to solve the
problem and keep the consumers safe from being conned into
getting and utilizing goods that are counterfeit.
The use of the Radio Frequency Identification (RFID) to handle
the issue of counterfeits
Most of the mobile phones manufacturing companies can take
advantage of this technology since it is the only promising way
of making it easier for the identification and control of the
spread and consumption of the counterfeit mobile phones by the
consumers who are unsuspecting.
Most of the manufacturers of the mobile phone companies can
integrate and use the radio frequency identification techniques
and mount the small chips in the phones. The companies can
also use the technologies in the different spare parts of the
mobile phones that they have produced so that they can be
easily distinguished from the counterfeit ones that are
continuing to circulate in the markets (Motorola.com, 2007).
45. This will make it easier for the identification of the counterfeit
mobile phones in the market. The companies should
subsequently have their representatives in the different markets
who are serving the purpose of assisting in the identification of
the products.
The RFID technology will make it easier for the distinction to
be made between those original products and the counterfeit
ones (Motorola.com, 2007).
This is the sure way that the companies can take advantage of
the technology and incorporate it with the aim of ensuring that
they control all the goods that are produced in the market. The
companies can also liaise with different governments who so
that they assist them in blocking the counterfeit goods from
being spread in the markets.
Conclusion
To conclude, by incorporating the RFID technology, the mobile
phones will not only be able to solve the problem of production
of the counterfeit goods and the subsequent distribution of the
same goods in the market, they will also be in a position to
effectively monitor their inventories in a way that they will be
able to check how their goods are flowing in different parts of
the market.
This technology will go ahead ensuring that the necessary
authorities and the mobile phone manufacturers are in a position
to identify and sensitize the different customers of the different
counterfeit products that are in the market. They can also
educate them on the different ways that they can use to identify
the fake products.
Reference
Motorola.com (2007) Business Benefits from Radio Frequency
Identification (RFID)
Final Paper Checklist
46. What is the problem in my industry?
General description of the business problem
Overview of RFID (Basics/Advances)
Business Justification - Business Process Integration (BPI)
48. Impact of Implementation – type of shipping/nation/worldwide
Description of administrative procedures – Human and Process
changes
Changes in Organization Policies or Enhancements
49. Training requirements
Maintenance of the system – Information Layer (storage), &
Decoupling (field maintenance).
Running Head: MOBILE PHONES MANUFACTURING
INDUSTRY 1
MOBILE PHONES MANUFACTURING INDUSTRY
5
Mobile Phones Manufacturing Industry
50. The RFID is one of the many technologies that have been
existing since the time memorial. The technology was innovated
and implemented to ensure that there exist a technology that
would ensure security, efficiency and time saving. The
technology has been seen relevant in many companies and its
impact felt and accepted by all. The paper is going to explain on
the different ways in which the RFID has been established and
used in the mobile manufacturing and distribution industry.
Mobile phones manufacturing industry
Any company should involve planning before starting producing
its products. The mobile manufacturing industry being not an
exceptional, it includes planning in its process of production.
The planning in the mobile and manufacturing industry applies
RFID. RFID is used in this case to make some important
decisions on pricing, timing and other basic logistics in the
mobile manufacturing industry (Shepard, 2005). Many
companies are now applying the RFID to make accurate
decisions.
In the manufacturing process of the mobile, RFID is used before
and during the manufacturing process in the goods application
for example. During manufacturing, the raw material is inputted
into the system using a case known as the pallet-level RFID.
The next material that follows is the tracking material that is
inputted to determine whether the manufacturing set is possible.
51. The tracking material identifies the items that pass the critical
step in the manufacturing process. The real-time information
obtained is used the brand owners easy to track down the
manufacturing process. The RFID give accurate records that can
be used for future planning and budgeting. The records are also
used to minimize errors since the information obtained can be
used to identify where the problem occurred in the past the
company can correct them and thus coming up with the best
quality mobile phones. The RFID is also used in counterfeit
detection. The RFID is used to generate IDs that they feed to
the genuine item. The IDs fed to the genuine devices are used to
detect the genuine devices in the market and turning down any
counterfeit mobile phones.
In most cases, the planning process is up to 10% inaccurate. The
inaccuracy makes it impossible for estimation of the material
used in the manufacturing of the mobile phones. The inaccuracy
may at times result in ordering extra products or less. The extra
bought products may end up in losses and even make the
manufacturing industry run at a loss of up to 10%. RFID is now
working in ensuring that the material imported and fed into the
system are accurately and thus the expected result is of high
quality. The RFID lowers the production cost by ensuring that
the raw material used are accurately measure, such that there
exist no access nor less. The mobile RFID is among the well-
established tools of in establishing accurate shipment. The
RFID is used in the picking and packing in the manufacturing
company (Juels, 2006). During picking, the mobile devices are
packed by identifying not only the brand size, shape and even
color. The identification and sorting are made possible by the
use of the RFID. The technology also provides the electronic
packing list which initially was done manually. The RFID has
helped in time-saving since it simplifies the packing and
generating the packing list. The brand owner receives the
electronic information right from the market without necessarily
count checking on the electronics packed. The RFID also gives
summary information on the entire transport time. The
52. information is used to answer any question a customer may
have. The information provided saves time that the supplier of
electronic could take explaining to the buyer.
The RFID uses fixed readers that provide a most feasible
solution. The readers promote production short time production
in the manufacturing industry. Most manufacturers who carry
out short-term contracts makes the RFID fixed readers (Ni, Liu,
Lau, & Patil, 2004). When a new contract starts, the owner send
information to the mobile RFID readers which makes the
process easy to move.
Mobile manufacturing industry cannot be complete if the
transport and distribution are not mentioned. Tracking of the
electronics is very important since the goods in transit require
security for the manufacturing industry to avoid any possible
losses that may occur during the process of transit. In the
process of transportation, the packages are identified and
information of each goods and time stamp provided. Reading is
usually done depending on the position where the package is
loaded. The reading is done depending on whether the goods are
being unloaded or loaded. On transportation, the RFID records
information on the goods being transported. The RFID creates
an accurate export or import documents.
The RFID also aids in the customs operation. The EPC code
generated has the code of the country of origin. The customs
official uses the code generated by the RFID to identify the
country of origin. By identifying the country of origin, of the
product result in determining, and minimizing the cases of
counterfeit.
The RFID is a new technology in the supply chain management
which has its main objective of replacing the past barcodes. The
RFID ensures that correct products are designated at the right
place at the right time. It has caused a massive revolution in the
supply chain management department. RFID has promoted the
accuracy thus eliminating the discrepancies to zero. It RFID has
created excellent efficiency, precision, and reliability. It also
provides relevant real-time information which supports
53. effective planning and administration processes. The practical
decision being a core factor that influences the production and
marketing process (Finkenzeller, 2003). If it is well done, the
industry will experience a transformation regarding profits
made by a given organization.
References
Finkenzeller, K., & Handbook, R. F. I. D. (1999). Radio-
frequency identification fundamentals and applications.
Chippenham: John Wiley & Son.
Finkenzeller, K. (2003). BOOK TOOLS.
Ni, L. M., Liu, Y., Lau, Y. C., & Patil, A. P. (2004).
LANDMARC: Indoor location sensing using active RFID.
Wireless Networks, 10(6), 701-710.
Shepard, S. (2005). RFID: radio frequency identification.
McGraw-Hill Professional.
Juels, A. (2006). RFID security and privacy: A research survey.
Selected Areas in Communications, IEEE Journal on,
24(2), 381-394.