SlideShare a Scribd company logo
1 of 53
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 1/11
DEPT.SSC.SAFEASSIGN - SSC TUTORING - SAFEASSIGN 2
015-2016
Draft SafeAssignment 35
Akshay Kotla on Sat, Apr 23 2016, 1:42 PM
42% highest match
Submission ID: 843e379c-16f3-486c-a59d-9be3a871abde
Citations (10/10)
Running Head:
Word Count: 2,164
Attachment ID: 121475621
rfid_in_mobile_manufacturing_…
42%
1 Another student's paper
2
http://www.knetbooks.com/foundations-lodging-management-1s
t-
hayes/bk/9780131700550
3 Another student's paper
4 Another student's paper
5 Another student's paper
6 Another student's paper
7 ProQuest Document
8 Another student's paper
9 Another student's paper
10 http://www.ukessays.com/essays/business/the-process-of-
improving-the-flow-of-material.php
http://safeassign.blackboard.com/
https://wilmu.blackboard.com/webapps/mdb-sa-
bb_bb60/originalityReportPrint?course_id=_423338_1&paperId
=121475621&&attemptId=843e379c-16f3-486c-a59d-
9be3a871abde&course_id=_423338_1
http://www.blackboard.com/docs/documentation.htm?DocID=19
1SafeAssign000en_us
https://wilmu.blackboard.com/webapps/mdb-sa-
bb_bb60/originalityReportText?paperId=119946982&course_id
=_423338_1
http://www.knetbooks.com/foundations-lodging-management-
1st-hayes/bk/9780131700550
https://wilmu.blackboard.com/webapps/mdb-sa-
bb_bb60/originalityReportText?paperId=117204141&course_id
=_423338_1
https://wilmu.blackboard.com/webapps/mdb-sa-
bb_bb60/proquestPaper?paperId=7355947&mac=1AB165FDE0F
C4B05E936DBD2CCEE451B&course_id=_423338_1
http://www.ukessays.com/essays/business/the-process-of-
improving-the-flow-of-material.php
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 2/11
1
RFID IN MOBILE MANUFACTURING INDUSTRY 1 RFID IN
MOBILE
MANUFACTURING INDUSTRY 10
MOBILE PHONES MANUFACTURING INDUSTRY
Student’s Name
Professor’s Name
Course Title
Date of Submission Mobile Phones Manufacturing Industry
2 TABLE OF CONTENTS
3Executive summary
Introduction 3 The problem of my industry 3 General descriptio
n of the business
problem 3 Overview of RFID (Basics/Advances) 4 Business Just
ification - Business
Process Integration (BPI) 4 Benefits and Disadvantages 5 Benef
its 5 Disadvantages 5
planning 6 Security Concerns 6 Purchasing 7 Installing 7 Impact
of Implementation
8 Description of administrative procedures 8 Changes in Organi
zation Policies or
Enhancements 8 Training requirements 8 Maintenance of the sys
tem 9 conclusion 9
References 10
1 MOBILE PHONES MANUFACTURING INDUSTRY
Executive summary
Introduction
1
THE RFID IS ONE OF THE MANY TECHNOLOGIES THAT
HAVE
BEEN EXISTING SINCE THE TIME MEMORIAL. THE TECH
NOLOGY
WAS INNOVATED AND IMPLEMENTED TO ENSURE THAT
THERE
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 3/11
EXIST A TECHNOLOGY THAT WOULD ENSURE SECURITY
,
EFFICIENCY, AND TIME SAVING. THE TECHNOLOGY HAS
BEEN
SEEN RELEVANT IN MANY COMPANIES AND ITS IMPACT
FELT AND
ACCEPTED BY ALL. THEREFORE, THIS RESEARCH PAPER
WILL TRY
TO EXPLAIN THE DIFFERENT WAYS IN WHICH THE RFID
HAS BEEN
ESTABLISHED AND USED IN MOBILE MANUFACTURING I
NDUSTRY
TO DETECT COUNTERFEIT MOBILE PHONES.
3 WHAT IS THE PROBLEM IN MY INDUSTRY?
4
MASS PRODUCTION OF MANY FAKE MOBILE PHONES IN
THE
WHOLE WORLD
General description of the business problem
For over an extended period, Mobile Manufacturing Industry ha
s faced many
challenges, among them being the prominent issue of counterfei
ts. 4 THERE
HAS BEEN A MASS PRODUCTION OF MANY FAKE MOBIL
E PHONES
IN THE WHOLE WORLD. THERE ARE MANY CHINESE CO
MPANIES
WHICH HAVE COME UP AND WITH LITTLE CAPITAL, THE
Y HAVE
BEEN ABLE TO PRODUCE AND DISTRIBUTE SOME COUN
TERFEIT
PRODUCTS IN THE WHOLE WORLD(RIZWAN ET AL., 2014
).
THESE MOBILE PHONES PRODUCTS USUALLY HAVE THE
SAME
DESIGN AS THE ORIGINAL PRODUCTS. THEY ARE ALSO
GIVEN
NAMES THAT CAN CONFUSE THE UNSUSPECTING BUYE
RS. THE
OTHER KEY IMPORTANT THING ABOUT THESE PRODUCT
S IS THAT
THEY ARE USUALLY SOLD TO THE MARKET AT RELATI
VELY LOWER
PRICES AS COMPARED TO THE ORIGINAL MOBILE PHON
ES.
Overview of RFID (Basics/Advances)
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 4/11
1
IN MOBILE MANUFACTURING INDUSTRY, RFID IS USED
BEFORE
AND DURING THE MANUFACTURING PROCESS IN THE G
OODS
APPLICATION FOR EXAMPLE. DURING MANUFACTURIN
G, THE RAW
MATERIAL IS INPUTTED INTO THE SYSTEM USING A CA
SE KNOWN
AS THE PALLET-LEVEL RFID. THE FOLLOWING MATERIA
L THAT
FOLLOWS IS THE TRACKING MATERIAL THAT IS CODED
TO
DETERMINE WHETHER THE MANUFACTURING SET IS PO
SSIBLE.
THE MONITORING EQUIPMENT IDENTIFIES THE ITEMS T
HAT PASS
THE CRITICAL STEP IN THE PRODUCTION PROCESS. THE
REAL-
TIME INFORMATION OBTAINED IS USED THE BRAND OW
NERS EASY
TO TRACK DOWN THE MANUFACTURING PROCESS(LEE,
KIM, KIM, &
PARK, 2010).
THE RFID GIVE ACCURATE RECORDS THAT CAN BE USE
D FOR
FUTURE PLANNING AND BUDGETING. THE RECORDS AR
E ALSO
USED TO MINIMIZE ERRORS SINCE THE INFORMATION O
BTAINED
CAN BE USED TO IDENTIFY WHERE THE PROBLEM OCCU
RRED IN
THE PAST THE COMPANY CAN CORRECT THEM AND TH
US COMING
UP WITH THE BEST QUALITY MOBILE PHONES. THE RFI
D IS ALSO
USED IN COUNTERFEIT DETECTION. THE RFID IS USED T
O
GENERATE IDS THAT THEY FEED TO THE GENUINE ITEM
. THE IDS
SUPPLIED TO THE CERTAIN DEVICES ARE USED TO DET
ECT THE
ACTUAL DEVICES IN THE MARKET AND TO TURN DOWN
ANY
COUNTERFEIT MOBILE PHONES.
Business Justification - Business Process Integration (BPI)
4
MOBILE MANUFACTURING INDUSTRY CAN INTEGRATE
AND USE
THE RADIO FREQUENCY IDENTIFICATION TECHNIQUES
AND
MOUNT THE SMALL CHIPS IN THE PHONES. THIS COMPA
NY CAN
ALSO USE THE TECHNOLOGIES IN THE DIFFERENT SPAR
E PARTS OF
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 5/11
THE MOBILE PHONES THAT THEY HAVE PRODUCED SO
THAT THEY
CAN BE EASILY DISTINGUISHED FROM THE FALSE ONES
THAT ARE
CONTINUING TO CIRCULATE IN THE MARKETS(SARI, 201
0). THIS
WILL MAKE IT EASIER FOR THE IDENTIFICATION OF TH
E
COUNTERFEIT MOBILE PHONES IN THE MARKET MOBIL
E
MANUFACTURING INDUSTRY SHOULD SUBSEQUENTLY
HAVE
THEIR REPRESENTATIVES IN THE DIFFERENT MARKETS
WHO ARE
SERVING THE PURPOSE OF ASSISTING IN THE IDENTIFIC
ATION OF
THE PRODUCTS.
3 BENEFITS AND DISADVANTAGES
Benefits
4
THE RFID TECHNOLOGY HAS MADE IT EASIER FOR THE
DISTINCTION TO BE DRAWN BETWEEN THOSE ORIGINA
L
PRODUCTS AND THE COUNTERFEIT ONES. THIS IS THE S
URE WAY
THAT THE MOBILE MANUFACTURING INDUSTRY CAN T
AKE
ADVANTAGE OF THE TECHNOLOGY AND INCORPORATE
IT WITH
THE AIM OF ENSURING THAT THEY CONTROL ALL THE
GOODS
THAT ARE PRODUCED IN THE MARKET(CLARKE-HILL, H
ILLIER, &
COMFORT, 2005). THE COMPANIES CAN ALSO LIAISE WI
TH
DIFFERENT GOVERNMENTS WHO SO THAT THEY ASSIST
THEM IN
BLOCKING THE COUNTERFEIT GOODS FROM BEING SPR
EAD IN THE
MARKETS.
MOBILE MANUFACTURING INDUSTRY CAN TAKE ADVA
NTAGE OF
THIS TECHNOLOGY SINCE IT IS THE ONLY PROMISING
WAY OF
MAKING IT EASIER FOR THE IDENTIFICATION AND CON
TROL OF
THE SPREAD AND CONSUMPTION OF THE COUNTERFEIT
MOBILE
PHONES BY THE CONSUMERS WHO ARE UNSUSPECTING.
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 6/11
Disadvantages
However, the use of RFID technology has also some challenges
to the user or the
company that wants to implement it. RFID has a lot of technical
, ethical, and privacy
problems. Many businesses in the world have performed differe
nt types of RFID
devices that some even do not meet the global standards. Some
of the RFID devices
are not meant to leave their network this makes it difficult for c
ompanies and
consumers to share these devices. Similarly, RFID is faced with
a problem of tag and
reader collision when there is signal overlapping from two or m
ore readers.
Furthermore, RFID device does not have the ability to differenti
ate between many
users which can allow unauthorized people to view the content y
our items which are
meant to be privacy. Moreover, RFID is designed to read origin
al product from a
distance, and privacy issues cannot be maintained as people can
use a high-gain
antenna(Glasser, Goodman, & Einspruch, 2007).
Planning
Planning of the RFID communication system to detect first mob
ile phones from
counterfeit mobile phones in the market is imperative. Firstly, p
lanning involves
setting goals and objectives of the need of choosing the RFID pr
ogram. Besides, the
plan also includes the statement of the interference of the enviro
nmental factors
such as mutual coverage and other multiple readers. Signals fro
m the tags towards
the readers must be taken into consideration the so-called uplink
and traditional
cellular networks.
Furthermore, planning of RFID demands the companies in the m
arket to evaluate
and identify right applications of the RFID plan and deployment
s in the market. To
determine the counterfeit mobile phone, businesses in the marke
t are advised to
plan for quality standards, team building, vendor selection, eme
rging technologies,
integration, and infrastructure that is required.
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 7/11
Security Concerns - (Privacy/Middleware/Information Safekeepi
ng/Data Access,
Transition & Operations, Authentication & Authorization –
user ID/password
Data security is critical issues that must be addressed in details
from both the
business and technical point of view so as minimize the increase
of ubiquity of RFID
technology. Most importantly, the RFID security program must
meet demands from
the users and the public so as to maintain their privacy. RFID is
faced by security
threats from unauthorized readers, side channel attacks as well a
s the clone or rogue
tags. Maintaining of security programs of RFID involves the co
ntribution of all the
stakeholders from consumers, government, corporations, and RF
ID solution
providers(Sari, 2010). Data security can be solved by the use of
Generation two
protocol which has the ability uses tag pseudonyms, strong data
encryption, strong
password protection as well as tag reader authentication.
Similarly, there have been advancements of current data securit
y strategies by
Generation mostly due to technological advancements. RFID tec
hnology typically
helps to end up with maximum security by using back-end and f
ront-end security
measures. Back and front end security plans uses industry based
standard network
technology and using information pointers instead of actual info
rmation
respectively.
Purchasing
Before purchasing a RFID system, there are many features one s
hould look at
especially because of the task the system is intended to perform.
Purchasing RFID
software involves many activities such as network infrastructure
installation, data
management, hardware installation like antennas and readers as
well as the cost of
middleware items and products. RFID system should be selected
properly because
poor selection can affect the efficiency of counterfeit detection
of mobile phones.
RFID system purchased must be able to perform its work efficie
ntly should be
reliable (Tag Singulation) such as tens, hundreds, or thousands.
Tag sensitivity of
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 8/11
RFID system should be considered when one is buying the syste
m; the sensitive
nature of RFID system improves the performance and data inter
polation. A RFID
system selected to be purchased should have interference tolera
nce from other
readers in the same environment so as to minimize the interfere
nce of its
performance by other readers.
Installing
Installation of RFID reader involves some processes. Tags are u
sually attached to all
products and mobile phones that are to be tracked. The cards, w
hich are mostly
made from pure tag-chip (integrated circuit), connected to the a
ntenna(Want,
2006). Antenna readers of the RFID system are typically built fr
om different types of
tags like labels, security tags, apparel hang tags, asset tags from
the industries.
Furthermore, card chip has the memory system which typically
keeps the items or
the mobile’s Electronic Product Code (EPC). More so, tag chip
also stores other
useful information that makes it possible for the mobile device t
o be tracked by
RFID reader or read it from different areas with the help of inte
rnet connection.
Impact of Implementation – type of shipping/nation/worldwide
3 DESCRIPTION OF ADMINISTRATIVE PROCEDURES –
HUMAN AND
PROCESS CHANGES
Mobile Phones Manufacturing Industry has Administrative proc
edures in help to set
rules and policies that eventually enable the company to manage
its performance.
Administrative procedures enable organization and workers to b
e efficient,
responsible, and accountable as well as more consistencies.
3
CHANGES IN ORGANIZATION POLICIES OR ENHANCEME
NTS
With the use of RFID system technologies, companies are force
d to change their
organizational policies and strategies so as to enhance the perfo
rmance of the
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course_… 9/11
scheme. Businesses or organizations are supposed to come up w
ith specialized RFID
task force which is responsible for defining, designing, and plan
ning RFID
strategies. Long-term strategies and policies must be developed
so that labor costs
and increased customer satisfaction can be achieved in future.
Training requirements
Implementation of RFID requires educating those people (worke
rs and consumers)
who are going to be involved in the implementation process. Bo
th industry analysis
and publication can help to create awareness of the importance
of using RFID
system technology to detect counterfeit mobile phones. Industry
conferences can
contribute to spreading the knowledge of RFID technology, and
government can
also educate people on the financial loss that is created by count
erfeit businesses.
Workers must be trained on any new software of devices that ha
s been introduced
into the firm processes by the management. Training employees
also ensure that
RFID strategies successively meet the organization's objectives
and reduce
operational risks.
Maintenance of the system –
Information Layer (storage), & Decoupling (field
maintenance).
Support of any software or devices is paramount so as to increas
e their durability
and working efficiency. Sometimes, lab management can be con
structed so as to
store RFID system. Information stored in RFID system should b
e stored properly so
as to minimize loss or cost of retrieving information. Devices in
the field should be
protected well to reduce blockage and unauthorized persons(Wa
nt, 2006). More
advanced storage of information should be developed such as w
eb-based or internet
information management. Working conditions of the RFID syste
m in the field
should be well studied because of their high standards which ca
n demand high
working conditions. Lastly, integrating much technological adva
ncement in storage
and handling of RFID system enables convenience and effective
ness of information
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course… 10/11
management as well as flow.
Conclusion
4
RESEARCH HAS REVEALED THAT THE USE OF RADIO FR
EQUENCY
IDENTIFICATION CAN ASSIST MUCH IN AN ATTEMPT TO
SOLVE THE
PROBLEM AND KEEP THE CONSUMERS SAFE FROM BEIN
G CONNED
INTO GETTING AND UTILIZING MOBILE PHONES THAT A
RE
COUNTERFEIT.
References Clarke-Hill, P. J. 5
AND C., HILLIER, D., & COMFORT, D. (2005).
6 THE BENEFITS, CHALLENGES AND IMPACTS OF RADIO
FREQUENCY IDENTIFICATION TECHNOLOGY (RFID) FOR
RETAILERS IN THE UK. MARKETING INTELLIGENCE & P
LANNING,
23(4), 395–402. 7
HTTP://DOI.ORG/10.1108/02634500510603492
Glasser, D. J., Goodman, K. W., & Einspruch, N. G. (2007). Chi
ps, tags and
scanners: 1
ETHICAL CHALLENGES FOR RADIO FREQUENCY
IDENTIFICATION. Ethics and Information Technology.
http://doi.org/10.1007/s10676-006-9124-0
Lee, D., Kim, S., Kim, H., & Park, N. (2010). Mobile platform f
or networked RFID
applications. In ITNG2010 - 7th International Conference on Inf
ormation
Technology: New Generations (pp. 625–630).
http://doi.org/10.1109/ITNG.2010.188
Rizwan, M., Ali, A., Anjum, H., Naseer, M., Majeed, Z., Ali, M.
A., & Anwar, A.
(2014). Consumer’s Purchase Intention towards Counterfeit Mo
bile Phones. Journal
of Public Administration and Governance, 4(3), 75–89.
http://doi.org/10.5296/jpag.v4i3.5850
Sari, K. (2010). 8
EXPLORING THE IMPACTS OF RADIO FREQUENCY
4/23/2016 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina
lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde
&includeDeleted=true&course… 11/11
IDENTIFICATION (RFID) TECHNOLOGY ON SUPPLY CHAI
N
PERFORMANCE. 9
EUROPEAN JOURNAL OF OPERATIONAL
RESEARCH, 207(1), 174–183. 8
HTTP://DOI.ORG/10.1016/J.EJOR.2010.04.003
Want, R. (2006). 10
AN INTRODUCTION TO RFID TECHNOLOGY. IEEE
Pervasive Computing. http://doi.org/10.1109/MPRV.2006.2
Stat170 - Introductory Statistics
Semester 1, 2015 Assignment 2
Due Wednesday 20th May, 5.00pm via the iLearn link only
Submit via the Assignment 2 link in the ASSESSMENTS area of
iLearn.
Instructions:
1) The answers to all questions are to be word processed into
this document. You can either type formulae into your solution
or you can use the equation editor in Word or you may include
hand-written equations and diagrams by photographing them so
that you have the image saved as a picture file and then pasting
(inserting) the image/s into your solution.
2) Your assignment should be uploaded as a Word (.doc or
.docx) or PDF file (created from a Word processed document)
ONLY. Other formats, including a PDF created from an image,
will not be accepted by the system.
3) Please note that iLearn is fairly reliable, but, like any
website, it is occasionally unavailable for short periods.
Therefore, do not wait until the due date/time to start trying to
submit your work. If you have technical difficulties in
submitting your Assignment, it is your responsibility to ensure
these difficulties are resolved by the submission deadline. (The
University has Help services to support you in the event of a
problem; see http://ilearn.mq.edu.au/login/MQ/help.htm.)
4) No submissions will be accepted by email or other means.
5) When you think you have submitted your Assignment, please
check to make sure that you have submitted the correct file: In
iLearn, click on the Assignment, and you should see your
uploaded files.
6) This Assignment is worth 12% of your total grade for
STAT170. You may discuss the Assignment with your
classmates if you wish, but must then complete all of the
calculations and writing by yourself. Note: every semester,
several students receive a mark of 0 for this Assignment, due to
plagiarism. Ensure that you do not copy parts of your friends'
Assignment submissions. Submitting your assignment via
iLearn is a declaration that the work is your own.
Information:
This assignment is worth 12% and is marked out of 45.
Penalties apply as follows:
Submitted on Wednesday after 5pm: Deduct 10 marks
Submitted on Thursday: Deduct 15 marks
Submitted on Friday: Deduct 25 marks
No assignments submitted after Friday will be accepted.
Q1
Q2
Q3
Q4
Total
12
15
8
10
45
7) Question 1 (12 marks)
The times taken to assemble a car in a manufacturing plant
follow a normal distribution with a mean of 20 hours and a
standard deviation of 2 hours. Use this information to answer
the following questions. Show your working, including an
appropriate diagram.
a. Find the probability that a randomly selected car takes
between 21 and 24 hours to assemble.
b. Find the probability that the average assembly time for a
randomly selected sample of 5 cars manufactured in the plant
will be longer than 22 hours.
c. 69% of new cars purchased in Australia have automatic
transmission. Find the probability that less than 40 new cars
from a random sample of 50 have automatic transmission.
Question 2 (15 marks)
In 2013, a study of 50 cruise ships was undertaken to
investigate the variables which determine the crew size of a
cruise ship. For each of the 50 cruise ships, information was
recorded on their most recent cruise.
Some of the variables recorded on each cruise ship are
described below.
Variable Name Variable Description
Ship Name of cruise ship
Age Age of the cruise ship in years as of 2013
Cabins Number of cabins
Passengers Number of passengers on most recent cruise
Crew Number of crew on most recent cruise
The following output was constructed from information
recorded on the age and the crew size of the 50 cruise ships in
the study. Consider this output for parts a. to f.
Regression Analysis: Crew versus Age
Model Summary
S R-sq R-sq(adj) R-sq(pred)
235.954 49.67% 48.62% 45.38%
Coefficients
Term Coef SE Coef T-Value P-Value VIF
Constant 1301.3 87.2 14.92 0.000
Age -35.74 5.19 -6.88 0.000 1.00
Regression Equation
Crew = 1301.3 - 35.74 Age
Question 2 continued
a. Comment on the relation between the age of a cruise ship and
the number of crew employed on the ship:
b. Did the oldest cruise ship have the largest crew size?
c. What was the approximate age and crew size of the oldest
cruise ship?
d. 6 of the cruise ships were 12 years old. What was the
approximate crew size of the 12 year old ship with the smallest
crew size?
e. The 12 year old cruise ship with the smallest crew size had
the largest residual. Calculate the approximate value of this
residual, using your results from part d.
f. Write down one reason (referring specifically to relevant part
of the output on the previous page) why a linear model may not
be a good model for predicting the number of crew required on
a cruise ship from the age of the cruise ship:
Question 2 continued
Now consider both the number of cabins and the number of
passengers as possible predictors of the crew size. The
following output was constructed from the 50 cruise ships in the
sample. Use this information for the remainder of Question 4.
Crew vs Cabins:
Regression Analysis: Crew versus Cabins
Model Summary
S R-sq R-sq(adj) R-sq(pred)
81.3511 94.02% 93.89% 93.52%
Coefficients
Term Coef SE Coef T-Value P-Value
Constant 96.6 26.3 3.67 0.001
Cabins 0.7791 0.0284 **** *****
Crew vs Passengers:
Regression Analysis: Crew versus Passengers
Model Summary
S R-sq R-sq(adj) R-sq(pred)
94.2836 91.96% 91.80% 91.15%
Coefficients
Term Coef SE Coef T-Value P-Value
Constant 118.3 29.9 3.95 0.000
Passengers 0.3726 0.0159 23.44 0.000
Question 2 (continued)
g. Carry out an appropriate hypothesis test, using any relevant
information from the previous page, to answer the following
research question. (You should comment on any test
assumption/s but you can assume that assumption/s are
reasonably well satisfied.)
Research Question: Is the number of cabins on a cruise ship a
useful predictor for the crew size?
Hypothesis Test:
h. Now consider the following research question:
Research Question: Is there a significant linear relation between
the number of passengers on a cruise ship and the crew size
required?
Calculate a 95% confidence interval to estimate the population
slope of the line which relates the number of passengers and the
crew size of a cruise ship. Interpret your interval in order to
answer the research question. Note that the assumptions are
satisfied for this linear model (see scatter plot and residual
plots) – you do not need to comment on these here).
i. Confidence Interval:
ii. Conclusion:
.
Medical researchers carried out a study to compare various
methods of pain relief for patients suffering different types of
pain. 115 patients who took part in this study to test the
effectiveness of slow release ‘pain patches’ applied directly to
the skin. 52 of these subjects suffered from chronic back pain
while the other 63 subjects were chronic migraine sufferers.
Each subject had pain scores recorded before and again 2 hours
after applying the ‘pain patch’ to the skin. Pain scores were a
self-assessed score out of 10. A score of 0 indicated no pain and
a score of 10 would indicate the most extreme possible pain.
Questions 3 to 5 are based on this study.
Variable Description
ID ID number for patient
Condition Medical Condition: 1 = Back pain, 2 =
Migraine
PainScoreBefore Self-assessed pain score before
pain patch treatment applied
PainScoreAfter Self-assessed pain score 2 hours after
pain patch treatment applied
Question 3 (8 marks)
Using appropriate parts of the following output which was
constructed using the results of this study to carry out a
hypothesis test in the space provided on the following page to
answer this research question:
Research Question: Do self-assessed pain scores two hours
after applying pain patches differ, on average, between patients
suffering back pain and patients suffering with migraine.
Descriptive Statistics: PainScoreAfter_Back,
PainScoreAfter_Migraine
Variable N Mean SE Mean StDev Minimum
Median Maximum
PainScoreAfter_Back 52 5.933 0.155 1.116 3.500
6.000 8.500
PainScoreAfter_Migraine 63 4.999 0.118 0.938 3.000
5.000 7.000
Question 3
Hypothesis Test:
Question 4 (10 marks)
Research Question: Is there a significant change in self-assessed
pain scores two hours after applying ‘pain patches’ to the skin
for migraine sufferers?
a. The file, PainScores.mtw, which is available on iLearn,
contains some of the data from the study described on page 6.
Use these data to carry out an appropriate hypothesis test to
answer this research question above.
b. Copy and paste appropriate Minitab output for this test, along
with appropriate graphical summaries onto the following page.
All Minitab output should be neatly presented and clearly
labelled. Marks will be deducted for summaries which do not
have appropriate titles and labels.
c. Write a report addressing the research question above on the
page provided. Refer to the document ‘A Guide to Report
Writing’ and, in particular, to the section headed ‘A Short
Guide to Report Writing for STAT170 students’ which is
provided on iLearn. Your report should be based on the results
of an appropriate hypothesis tests as directed in this guide.
Your report not exceed one A4 page and should be word-
processed and presentedon the page provided. It should include
the following headings:
Introduction
Methods
Results
Conclusion
Assignment 1
8
STAT170 Assignment 2 Session 1 2015
2000-200-400-600
14
12
10
8
6
4
2
0
Residual
F
r
e
q
u
e
n
c
y
Histogram
(response is Crew)
180016001400120010008006004002000
1400
1200
1000
800
600
400
200
0
Cabins
C
r
e
w
Scatterplot of Crew vs Cabins
1400120010008006004002000
200
100
0
-100
-200
Fitted Value
R
e
s
i
d
u
a
l
Versus Fits
(response is Crew)
160800-80-160
16
14
12
10
8
6
4
2
0
Residual
F
r
e
q
u
e
n
c
y
Histogram
(response is Crew)
3500300025002000150010005000
1400
1200
1000
800
600
400
200
0
Passengers
C
r
e
w
Scatterplot of Crew vs Passengers
1400120010008006004002000
200
100
0
-100
-200
-300
Fitted Value
R
e
s
i
d
u
a
l
Versus Fits
(response is Crew)
1000-100-200
16
14
12
10
8
6
4
2
0
Residual
F
r
e
q
u
e
n
c
y
Histogram
(response is Crew)
108642
20
15
10
5
0
108642
16
14
12
10
8
6
4
2
0
PainScoreAfter_Back
F
r
e
q
u
e
n
c
y
PainScoreAfter_Migraine
Histogram of PainScoreAfter_Back, PainScoreAfter_Migraine
PainScoreAfter_MigrainePainScoreAfter_Back
9
8
7
6
5
4
3
D
a
t
a
Boxplot of PainScoreAfter_Back, PainScoreAfter_Migraine
403530252015105
1400
1200
1000
800
600
400
200
0
Age
C
r
e
w
Scatterplot of Crew vs Age
120010008006004002000
400
200
0
-200
-400
-600
Fitted Value
R
e
s
i
d
u
a
l
Versus Fits
(response is Crew)
Running Head: MOBILE PHONES MANUFACTURING
INDUSTRY 1
MOBILE PHONES MANUFACTURING INDUSTRY
2
Mobile Phones Manufacturing Industry
Introduction
The use of the RFID is a technique that is not new. It had been
used as early as during the world war two. This technique has
been received positively by the different firm since it assists in
the process of management and conducting of their businesses.
THE EXECUTIVE SUMMARY ON THE INDUSTRY AND THE
BUSINESS PROBLEM THAT IS TO BE SOLVED
Mobile phones manufacturing industry
For over a long period of time, the mobile phones
manufacturing industry has faced some challenges. Among them
being the prominent issue of counterfeits. There has been a
mass production of many counterfeit mobile phones in the
whole world. There are many Chinese companies which have
come up and with little capital, they have been able to produce
and distribute some counterfeit products in the whole world.
These products usually have the same design as the original
products. They are also given names that can confuse the
unsuspecting buyers. The other key important thing about these
products is that they are usually sold to the market at relatively
lower prices as compared to the original mobile phones
(Motorola.com, 2007).
These companies that are involved in the making of the phones
also tend to use technology that resembles to a much extent the
ones that are used by the companies that deal with the
manufacture of genuine mobile phones such as the Apple
Company which manufactures IPhones.
The IPhones have their counterfeit in the market, and they go by
the name Hi-Phone. This means that an unsuspecting customer
will buy the phone thinking that it is that which has been made
by the Apple Company. The majority of these mobile phones are
also complaining of being given substandard products.
These counterfeits in most cases are usually made of low-
quality technology and as a result, they are also among the
products with the poorest qualities. The production and
distribution of the counterfeit products have brought a lot of the
negative consequences to the industry as a whole
(Motorola.com, 2007).
To start with, a lot of revenue is always lost to those companies
which produce and sell the counterfeit products. It also
contributes much to reducing the amount of income that the
companies such as the Apple Company which produces genuine
products get from the sale of their goods.
Such loss of revenue makes it difficult for some of the
companies to fully operate and can even lead to other companies
falling out of the business.
The other effect of the sale of the counterfeit goods is that since
the home companies are reducing the amount of revenue that
they get from the sale of their products, they are likely to not to
provide better services to their employees, and at times, they
are likely to kick out some of them.
The industries which have been thriving for a long time is now
facing numerous counterfeit problems that have made even
some of them to think about investing in other things and to shy
totally away from the manufacture of mobile phones.
Research has however revealed that the use of Radio Frequency
Identification can assist much in an attempt to solve the
problem and keep the consumers safe from being conned into
getting and utilizing goods that are counterfeit.
The use of the Radio Frequency Identification (RFID) to handle
the issue of counterfeits
Most of the mobile phones manufacturing companies can take
advantage of this technology since it is the only promising way
of making it easier for the identification and control of the
spread and consumption of the counterfeit mobile phones by the
consumers who are unsuspecting.
Most of the manufacturers of the mobile phone companies can
integrate and use the radio frequency identification techniques
and mount the small chips in the phones. The companies can
also use the technologies in the different spare parts of the
mobile phones that they have produced so that they can be
easily distinguished from the counterfeit ones that are
continuing to circulate in the markets (Motorola.com, 2007).
This will make it easier for the identification of the counterfeit
mobile phones in the market. The companies should
subsequently have their representatives in the different markets
who are serving the purpose of assisting in the identification of
the products.
The RFID technology will make it easier for the distinction to
be made between those original products and the counterfeit
ones (Motorola.com, 2007).
This is the sure way that the companies can take advantage of
the technology and incorporate it with the aim of ensuring that
they control all the goods that are produced in the market. The
companies can also liaise with different governments who so
that they assist them in blocking the counterfeit goods from
being spread in the markets.
Conclusion
To conclude, by incorporating the RFID technology, the mobile
phones will not only be able to solve the problem of production
of the counterfeit goods and the subsequent distribution of the
same goods in the market, they will also be in a position to
effectively monitor their inventories in a way that they will be
able to check how their goods are flowing in different parts of
the market.
This technology will go ahead ensuring that the necessary
authorities and the mobile phone manufacturers are in a position
to identify and sensitize the different customers of the different
counterfeit products that are in the market. They can also
educate them on the different ways that they can use to identify
the fake products.
Reference
Motorola.com (2007) Business Benefits from Radio Frequency
Identification (RFID)
Final Paper Checklist
What is the problem in my industry?
General description of the business problem
Overview of RFID (Basics/Advances)
Business Justification - Business Process Integration (BPI)
Benefits and Disadvantages
Planning
Security Concerns - (Privacy/Middleware/Information
Safekeeping/Data Access, Transition & Operations,
Authentication & Authorization – user ID/password
Purchasing
Installing
Impact of Implementation – type of shipping/nation/worldwide
Description of administrative procedures – Human and Process
changes
Changes in Organization Policies or Enhancements
Training requirements
Maintenance of the system – Information Layer (storage), &
Decoupling (field maintenance).
Running Head: MOBILE PHONES MANUFACTURING
INDUSTRY 1
MOBILE PHONES MANUFACTURING INDUSTRY
5
Mobile Phones Manufacturing Industry
The RFID is one of the many technologies that have been
existing since the time memorial. The technology was innovated
and implemented to ensure that there exist a technology that
would ensure security, efficiency and time saving. The
technology has been seen relevant in many companies and its
impact felt and accepted by all. The paper is going to explain on
the different ways in which the RFID has been established and
used in the mobile manufacturing and distribution industry.
Mobile phones manufacturing industry
Any company should involve planning before starting producing
its products. The mobile manufacturing industry being not an
exceptional, it includes planning in its process of production.
The planning in the mobile and manufacturing industry applies
RFID. RFID is used in this case to make some important
decisions on pricing, timing and other basic logistics in the
mobile manufacturing industry (Shepard, 2005). Many
companies are now applying the RFID to make accurate
decisions.
In the manufacturing process of the mobile, RFID is used before
and during the manufacturing process in the goods application
for example. During manufacturing, the raw material is inputted
into the system using a case known as the pallet-level RFID.
The next material that follows is the tracking material that is
inputted to determine whether the manufacturing set is possible.
The tracking material identifies the items that pass the critical
step in the manufacturing process. The real-time information
obtained is used the brand owners easy to track down the
manufacturing process. The RFID give accurate records that can
be used for future planning and budgeting. The records are also
used to minimize errors since the information obtained can be
used to identify where the problem occurred in the past the
company can correct them and thus coming up with the best
quality mobile phones. The RFID is also used in counterfeit
detection. The RFID is used to generate IDs that they feed to
the genuine item. The IDs fed to the genuine devices are used to
detect the genuine devices in the market and turning down any
counterfeit mobile phones.
In most cases, the planning process is up to 10% inaccurate. The
inaccuracy makes it impossible for estimation of the material
used in the manufacturing of the mobile phones. The inaccuracy
may at times result in ordering extra products or less. The extra
bought products may end up in losses and even make the
manufacturing industry run at a loss of up to 10%. RFID is now
working in ensuring that the material imported and fed into the
system are accurately and thus the expected result is of high
quality. The RFID lowers the production cost by ensuring that
the raw material used are accurately measure, such that there
exist no access nor less. The mobile RFID is among the well-
established tools of in establishing accurate shipment. The
RFID is used in the picking and packing in the manufacturing
company (Juels, 2006). During picking, the mobile devices are
packed by identifying not only the brand size, shape and even
color. The identification and sorting are made possible by the
use of the RFID. The technology also provides the electronic
packing list which initially was done manually. The RFID has
helped in time-saving since it simplifies the packing and
generating the packing list. The brand owner receives the
electronic information right from the market without necessarily
count checking on the electronics packed. The RFID also gives
summary information on the entire transport time. The
information is used to answer any question a customer may
have. The information provided saves time that the supplier of
electronic could take explaining to the buyer.
The RFID uses fixed readers that provide a most feasible
solution. The readers promote production short time production
in the manufacturing industry. Most manufacturers who carry
out short-term contracts makes the RFID fixed readers (Ni, Liu,
Lau, & Patil, 2004). When a new contract starts, the owner send
information to the mobile RFID readers which makes the
process easy to move.
Mobile manufacturing industry cannot be complete if the
transport and distribution are not mentioned. Tracking of the
electronics is very important since the goods in transit require
security for the manufacturing industry to avoid any possible
losses that may occur during the process of transit. In the
process of transportation, the packages are identified and
information of each goods and time stamp provided. Reading is
usually done depending on the position where the package is
loaded. The reading is done depending on whether the goods are
being unloaded or loaded. On transportation, the RFID records
information on the goods being transported. The RFID creates
an accurate export or import documents.
The RFID also aids in the customs operation. The EPC code
generated has the code of the country of origin. The customs
official uses the code generated by the RFID to identify the
country of origin. By identifying the country of origin, of the
product result in determining, and minimizing the cases of
counterfeit.
The RFID is a new technology in the supply chain management
which has its main objective of replacing the past barcodes. The
RFID ensures that correct products are designated at the right
place at the right time. It has caused a massive revolution in the
supply chain management department. RFID has promoted the
accuracy thus eliminating the discrepancies to zero. It RFID has
created excellent efficiency, precision, and reliability. It also
provides relevant real-time information which supports
effective planning and administration processes. The practical
decision being a core factor that influences the production and
marketing process (Finkenzeller, 2003). If it is well done, the
industry will experience a transformation regarding profits
made by a given organization.
References
Finkenzeller, K., & Handbook, R. F. I. D. (1999). Radio-
frequency identification fundamentals and applications.
Chippenham: John Wiley & Son.
Finkenzeller, K. (2003). BOOK TOOLS.
Ni, L. M., Liu, Y., Lau, Y. C., & Patil, A. P. (2004).
LANDMARC: Indoor location sensing using active RFID.
Wireless Networks, 10(6), 701-710.
Shepard, S. (2005). RFID: radio frequency identification.
McGraw-Hill Professional.
Juels, A. (2006). RFID security and privacy: A research survey.
Selected Areas in Communications, IEEE Journal on,
24(2), 381-394.

More Related Content

Similar to 4232016 SafeAssign Originality Reporthttpswilmu.black.docx

Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco Portfolio
Sandy DiFranco
 
Research Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxResearch Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docx
gholly1
 
What is needed rfid
What is needed rfidWhat is needed rfid
What is needed rfid
halkett
 
Traceability in Manufacturing
Traceability in Manufacturing Traceability in Manufacturing
Traceability in Manufacturing
Barcoding, Inc.
 
Top 20 Wearable Technology Companies 2014
Top 20 Wearable Technology Companies 2014Top 20 Wearable Technology Companies 2014
Top 20 Wearable Technology Companies 2014
Visiongain
 
Radio frequency technology
Radio frequency technologyRadio frequency technology
Radio frequency technology
ReemNasraddin
 

Similar to 4232016 SafeAssign Originality Reporthttpswilmu.black.docx (20)

IRJET- Clean India Mission: Beacon Technology
IRJET- Clean India Mission: Beacon TechnologyIRJET- Clean India Mission: Beacon Technology
IRJET- Clean India Mission: Beacon Technology
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco Portfolio
 
RFID technology
RFID technologyRFID technology
RFID technology
 
Research Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxResearch Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docx
 
Barcode & RFID Convergence: Enabling Greater Visibility Through Standards
Barcode & RFID Convergence: Enabling Greater Visibility Through StandardsBarcode & RFID Convergence: Enabling Greater Visibility Through Standards
Barcode & RFID Convergence: Enabling Greater Visibility Through Standards
 
What is needed rfid
What is needed rfidWhat is needed rfid
What is needed rfid
 
SCMR.Wearables
SCMR.WearablesSCMR.Wearables
SCMR.Wearables
 
Traceability in Manufacturing
Traceability in Manufacturing Traceability in Manufacturing
Traceability in Manufacturing
 
Rfid, an enabler in supply chain management
Rfid, an enabler in supply chain managementRfid, an enabler in supply chain management
Rfid, an enabler in supply chain management
 
Communications Interface Market Share, Insights by 2031
Communications Interface Market Share, Insights by 2031Communications Interface Market Share, Insights by 2031
Communications Interface Market Share, Insights by 2031
 
Smart Surveillance Monitoring System using Raspberry pi and pir sensor
Smart Surveillance Monitoring System using Raspberry  pi and pir sensorSmart Surveillance Monitoring System using Raspberry  pi and pir sensor
Smart Surveillance Monitoring System using Raspberry pi and pir sensor
 
Making a Better World with Technology Innovations
Making a Better World with Technology InnovationsMaking a Better World with Technology Innovations
Making a Better World with Technology Innovations
 
RFID Technology An Overview
RFID Technology An OverviewRFID Technology An Overview
RFID Technology An Overview
 
IRJET- Smart Wardrobe – IoT based Application
IRJET- Smart Wardrobe – IoT based ApplicationIRJET- Smart Wardrobe – IoT based Application
IRJET- Smart Wardrobe – IoT based Application
 
Top 20 Wearable Technology Companies 2014
Top 20 Wearable Technology Companies 2014Top 20 Wearable Technology Companies 2014
Top 20 Wearable Technology Companies 2014
 
Radio frequency technology
Radio frequency technologyRadio frequency technology
Radio frequency technology
 
Radio Frequency technology
Radio Frequency technologyRadio Frequency technology
Radio Frequency technology
 
Rfid
RfidRfid
Rfid
 
Drone automation in warehouse 4.0
Drone automation in warehouse 4.0Drone automation in warehouse 4.0
Drone automation in warehouse 4.0
 
Traceability in Manufacturing
Traceability in ManufacturingTraceability in Manufacturing
Traceability in Manufacturing
 

More from alinainglis

· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx
alinainglis
 
· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx
alinainglis
 
· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx
alinainglis
 
· How many employees are working for youtotal of 5 employees .docx
· How many employees are working for youtotal of 5 employees  .docx· How many employees are working for youtotal of 5 employees  .docx
· How many employees are working for youtotal of 5 employees .docx
alinainglis
 
· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx
alinainglis
 
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
alinainglis
 
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
alinainglis
 
· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx
alinainglis
 
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
alinainglis
 
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
alinainglis
 
· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx
alinainglis
 
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
alinainglis
 

More from alinainglis (20)

· Present a discussion of what team is. What type(s) of team do .docx
· Present a discussion of what team is. What type(s) of team do .docx· Present a discussion of what team is. What type(s) of team do .docx
· Present a discussion of what team is. What type(s) of team do .docx
 
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
 
· Prepare a research proposal, mentioning a specific researchabl.docx
· Prepare a research proposal, mentioning a specific researchabl.docx· Prepare a research proposal, mentioning a specific researchabl.docx
· Prepare a research proposal, mentioning a specific researchabl.docx
 
· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx
 
· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx
 
· Please use Firefox for access to cronometer.com16 ye.docx
· Please use Firefox for access to cronometer.com16 ye.docx· Please use Firefox for access to cronometer.com16 ye.docx
· Please use Firefox for access to cronometer.com16 ye.docx
 
· Please share theoretical explanations based on social, cultural an.docx
· Please share theoretical explanations based on social, cultural an.docx· Please share theoretical explanations based on social, cultural an.docx
· Please share theoretical explanations based on social, cultural an.docx
 
· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx
 
· How many employees are working for youtotal of 5 employees .docx
· How many employees are working for youtotal of 5 employees  .docx· How many employees are working for youtotal of 5 employees  .docx
· How many employees are working for youtotal of 5 employees .docx
 
· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx
 
· How does the distribution mechanism control the issues address.docx
· How does the distribution mechanism control the issues address.docx· How does the distribution mechanism control the issues address.docx
· How does the distribution mechanism control the issues address.docx
 
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
 
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
 
· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx
 
· Find current events regarding any issues in public health .docx
· Find current events regarding any issues in public health .docx· Find current events regarding any issues in public health .docx
· Find current events regarding any issues in public health .docx
 
· Explore and assess different remote access solutions.Assig.docx
· Explore and assess different remote access solutions.Assig.docx· Explore and assess different remote access solutions.Assig.docx
· Explore and assess different remote access solutions.Assig.docx
 
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
 
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
 
· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx
 
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

4232016 SafeAssign Originality Reporthttpswilmu.black.docx

  • 1. 4/23/2016 SafeAssign Originality Report https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde &includeDeleted=true&course_… 1/11 DEPT.SSC.SAFEASSIGN - SSC TUTORING - SAFEASSIGN 2 015-2016 Draft SafeAssignment 35 Akshay Kotla on Sat, Apr 23 2016, 1:42 PM 42% highest match Submission ID: 843e379c-16f3-486c-a59d-9be3a871abde Citations (10/10) Running Head: Word Count: 2,164 Attachment ID: 121475621 rfid_in_mobile_manufacturing_… 42% 1 Another student's paper 2 http://www.knetbooks.com/foundations-lodging-management-1s
  • 2. t- hayes/bk/9780131700550 3 Another student's paper 4 Another student's paper 5 Another student's paper 6 Another student's paper 7 ProQuest Document 8 Another student's paper 9 Another student's paper 10 http://www.ukessays.com/essays/business/the-process-of- improving-the-flow-of-material.php http://safeassign.blackboard.com/ https://wilmu.blackboard.com/webapps/mdb-sa- bb_bb60/originalityReportPrint?course_id=_423338_1&paperId =121475621&&attemptId=843e379c-16f3-486c-a59d- 9be3a871abde&course_id=_423338_1 http://www.blackboard.com/docs/documentation.htm?DocID=19 1SafeAssign000en_us https://wilmu.blackboard.com/webapps/mdb-sa- bb_bb60/originalityReportText?paperId=119946982&course_id =_423338_1 http://www.knetbooks.com/foundations-lodging-management- 1st-hayes/bk/9780131700550 https://wilmu.blackboard.com/webapps/mdb-sa- bb_bb60/originalityReportText?paperId=117204141&course_id =_423338_1 https://wilmu.blackboard.com/webapps/mdb-sa-
  • 3. bb_bb60/proquestPaper?paperId=7355947&mac=1AB165FDE0F C4B05E936DBD2CCEE451B&course_id=_423338_1 http://www.ukessays.com/essays/business/the-process-of- improving-the-flow-of-material.php 4/23/2016 SafeAssign Originality Report https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde &includeDeleted=true&course_… 2/11 1 RFID IN MOBILE MANUFACTURING INDUSTRY 1 RFID IN MOBILE MANUFACTURING INDUSTRY 10 MOBILE PHONES MANUFACTURING INDUSTRY Student’s Name Professor’s Name Course Title Date of Submission Mobile Phones Manufacturing Industry 2 TABLE OF CONTENTS 3Executive summary Introduction 3 The problem of my industry 3 General descriptio n of the business problem 3 Overview of RFID (Basics/Advances) 4 Business Just
  • 4. ification - Business Process Integration (BPI) 4 Benefits and Disadvantages 5 Benef its 5 Disadvantages 5 planning 6 Security Concerns 6 Purchasing 7 Installing 7 Impact of Implementation 8 Description of administrative procedures 8 Changes in Organi zation Policies or Enhancements 8 Training requirements 8 Maintenance of the sys tem 9 conclusion 9 References 10 1 MOBILE PHONES MANUFACTURING INDUSTRY Executive summary Introduction 1 THE RFID IS ONE OF THE MANY TECHNOLOGIES THAT HAVE BEEN EXISTING SINCE THE TIME MEMORIAL. THE TECH NOLOGY WAS INNOVATED AND IMPLEMENTED TO ENSURE THAT THERE 4/23/2016 SafeAssign Originality Report
  • 5. https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde &includeDeleted=true&course_… 3/11 EXIST A TECHNOLOGY THAT WOULD ENSURE SECURITY , EFFICIENCY, AND TIME SAVING. THE TECHNOLOGY HAS BEEN SEEN RELEVANT IN MANY COMPANIES AND ITS IMPACT FELT AND ACCEPTED BY ALL. THEREFORE, THIS RESEARCH PAPER WILL TRY TO EXPLAIN THE DIFFERENT WAYS IN WHICH THE RFID HAS BEEN ESTABLISHED AND USED IN MOBILE MANUFACTURING I NDUSTRY TO DETECT COUNTERFEIT MOBILE PHONES. 3 WHAT IS THE PROBLEM IN MY INDUSTRY? 4 MASS PRODUCTION OF MANY FAKE MOBILE PHONES IN THE WHOLE WORLD General description of the business problem For over an extended period, Mobile Manufacturing Industry ha s faced many
  • 6. challenges, among them being the prominent issue of counterfei ts. 4 THERE HAS BEEN A MASS PRODUCTION OF MANY FAKE MOBIL E PHONES IN THE WHOLE WORLD. THERE ARE MANY CHINESE CO MPANIES WHICH HAVE COME UP AND WITH LITTLE CAPITAL, THE Y HAVE BEEN ABLE TO PRODUCE AND DISTRIBUTE SOME COUN TERFEIT PRODUCTS IN THE WHOLE WORLD(RIZWAN ET AL., 2014 ). THESE MOBILE PHONES PRODUCTS USUALLY HAVE THE SAME DESIGN AS THE ORIGINAL PRODUCTS. THEY ARE ALSO GIVEN NAMES THAT CAN CONFUSE THE UNSUSPECTING BUYE RS. THE OTHER KEY IMPORTANT THING ABOUT THESE PRODUCT S IS THAT THEY ARE USUALLY SOLD TO THE MARKET AT RELATI VELY LOWER PRICES AS COMPARED TO THE ORIGINAL MOBILE PHON ES.
  • 7. Overview of RFID (Basics/Advances) 4/23/2016 SafeAssign Originality Report https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde &includeDeleted=true&course_… 4/11 1 IN MOBILE MANUFACTURING INDUSTRY, RFID IS USED BEFORE AND DURING THE MANUFACTURING PROCESS IN THE G OODS APPLICATION FOR EXAMPLE. DURING MANUFACTURIN G, THE RAW MATERIAL IS INPUTTED INTO THE SYSTEM USING A CA SE KNOWN AS THE PALLET-LEVEL RFID. THE FOLLOWING MATERIA L THAT FOLLOWS IS THE TRACKING MATERIAL THAT IS CODED TO DETERMINE WHETHER THE MANUFACTURING SET IS PO SSIBLE. THE MONITORING EQUIPMENT IDENTIFIES THE ITEMS T HAT PASS
  • 8. THE CRITICAL STEP IN THE PRODUCTION PROCESS. THE REAL- TIME INFORMATION OBTAINED IS USED THE BRAND OW NERS EASY TO TRACK DOWN THE MANUFACTURING PROCESS(LEE, KIM, KIM, & PARK, 2010). THE RFID GIVE ACCURATE RECORDS THAT CAN BE USE D FOR FUTURE PLANNING AND BUDGETING. THE RECORDS AR E ALSO USED TO MINIMIZE ERRORS SINCE THE INFORMATION O BTAINED CAN BE USED TO IDENTIFY WHERE THE PROBLEM OCCU RRED IN THE PAST THE COMPANY CAN CORRECT THEM AND TH US COMING UP WITH THE BEST QUALITY MOBILE PHONES. THE RFI D IS ALSO USED IN COUNTERFEIT DETECTION. THE RFID IS USED T O GENERATE IDS THAT THEY FEED TO THE GENUINE ITEM . THE IDS SUPPLIED TO THE CERTAIN DEVICES ARE USED TO DET
  • 9. ECT THE ACTUAL DEVICES IN THE MARKET AND TO TURN DOWN ANY COUNTERFEIT MOBILE PHONES. Business Justification - Business Process Integration (BPI) 4 MOBILE MANUFACTURING INDUSTRY CAN INTEGRATE AND USE THE RADIO FREQUENCY IDENTIFICATION TECHNIQUES AND MOUNT THE SMALL CHIPS IN THE PHONES. THIS COMPA NY CAN ALSO USE THE TECHNOLOGIES IN THE DIFFERENT SPAR E PARTS OF 4/23/2016 SafeAssign Originality Report https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde &includeDeleted=true&course_… 5/11 THE MOBILE PHONES THAT THEY HAVE PRODUCED SO THAT THEY CAN BE EASILY DISTINGUISHED FROM THE FALSE ONES THAT ARE
  • 10. CONTINUING TO CIRCULATE IN THE MARKETS(SARI, 201 0). THIS WILL MAKE IT EASIER FOR THE IDENTIFICATION OF TH E COUNTERFEIT MOBILE PHONES IN THE MARKET MOBIL E MANUFACTURING INDUSTRY SHOULD SUBSEQUENTLY HAVE THEIR REPRESENTATIVES IN THE DIFFERENT MARKETS WHO ARE SERVING THE PURPOSE OF ASSISTING IN THE IDENTIFIC ATION OF THE PRODUCTS. 3 BENEFITS AND DISADVANTAGES Benefits 4 THE RFID TECHNOLOGY HAS MADE IT EASIER FOR THE DISTINCTION TO BE DRAWN BETWEEN THOSE ORIGINA L PRODUCTS AND THE COUNTERFEIT ONES. THIS IS THE S URE WAY THAT THE MOBILE MANUFACTURING INDUSTRY CAN T AKE
  • 11. ADVANTAGE OF THE TECHNOLOGY AND INCORPORATE IT WITH THE AIM OF ENSURING THAT THEY CONTROL ALL THE GOODS THAT ARE PRODUCED IN THE MARKET(CLARKE-HILL, H ILLIER, & COMFORT, 2005). THE COMPANIES CAN ALSO LIAISE WI TH DIFFERENT GOVERNMENTS WHO SO THAT THEY ASSIST THEM IN BLOCKING THE COUNTERFEIT GOODS FROM BEING SPR EAD IN THE MARKETS. MOBILE MANUFACTURING INDUSTRY CAN TAKE ADVA NTAGE OF THIS TECHNOLOGY SINCE IT IS THE ONLY PROMISING WAY OF MAKING IT EASIER FOR THE IDENTIFICATION AND CON TROL OF THE SPREAD AND CONSUMPTION OF THE COUNTERFEIT MOBILE PHONES BY THE CONSUMERS WHO ARE UNSUSPECTING.
  • 12. 4/23/2016 SafeAssign Originality Report https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde &includeDeleted=true&course_… 6/11 Disadvantages However, the use of RFID technology has also some challenges to the user or the company that wants to implement it. RFID has a lot of technical , ethical, and privacy problems. Many businesses in the world have performed differe nt types of RFID devices that some even do not meet the global standards. Some of the RFID devices are not meant to leave their network this makes it difficult for c ompanies and consumers to share these devices. Similarly, RFID is faced with a problem of tag and reader collision when there is signal overlapping from two or m ore readers. Furthermore, RFID device does not have the ability to differenti ate between many users which can allow unauthorized people to view the content y our items which are meant to be privacy. Moreover, RFID is designed to read origin
  • 13. al product from a distance, and privacy issues cannot be maintained as people can use a high-gain antenna(Glasser, Goodman, & Einspruch, 2007). Planning Planning of the RFID communication system to detect first mob ile phones from counterfeit mobile phones in the market is imperative. Firstly, p lanning involves setting goals and objectives of the need of choosing the RFID pr ogram. Besides, the plan also includes the statement of the interference of the enviro nmental factors such as mutual coverage and other multiple readers. Signals fro m the tags towards the readers must be taken into consideration the so-called uplink and traditional cellular networks. Furthermore, planning of RFID demands the companies in the m arket to evaluate and identify right applications of the RFID plan and deployment s in the market. To determine the counterfeit mobile phone, businesses in the marke
  • 14. t are advised to plan for quality standards, team building, vendor selection, eme rging technologies, integration, and infrastructure that is required. 4/23/2016 SafeAssign Originality Report https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde &includeDeleted=true&course_… 7/11 Security Concerns - (Privacy/Middleware/Information Safekeepi ng/Data Access, Transition & Operations, Authentication & Authorization – user ID/password Data security is critical issues that must be addressed in details from both the business and technical point of view so as minimize the increase of ubiquity of RFID technology. Most importantly, the RFID security program must meet demands from the users and the public so as to maintain their privacy. RFID is faced by security threats from unauthorized readers, side channel attacks as well a s the clone or rogue
  • 15. tags. Maintaining of security programs of RFID involves the co ntribution of all the stakeholders from consumers, government, corporations, and RF ID solution providers(Sari, 2010). Data security can be solved by the use of Generation two protocol which has the ability uses tag pseudonyms, strong data encryption, strong password protection as well as tag reader authentication. Similarly, there have been advancements of current data securit y strategies by Generation mostly due to technological advancements. RFID tec hnology typically helps to end up with maximum security by using back-end and f ront-end security measures. Back and front end security plans uses industry based standard network technology and using information pointers instead of actual info rmation respectively. Purchasing Before purchasing a RFID system, there are many features one s hould look at
  • 16. especially because of the task the system is intended to perform. Purchasing RFID software involves many activities such as network infrastructure installation, data management, hardware installation like antennas and readers as well as the cost of middleware items and products. RFID system should be selected properly because poor selection can affect the efficiency of counterfeit detection of mobile phones. RFID system purchased must be able to perform its work efficie ntly should be reliable (Tag Singulation) such as tens, hundreds, or thousands. Tag sensitivity of 4/23/2016 SafeAssign Originality Report https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde &includeDeleted=true&course_… 8/11 RFID system should be considered when one is buying the syste m; the sensitive nature of RFID system improves the performance and data inter polation. A RFID system selected to be purchased should have interference tolera
  • 17. nce from other readers in the same environment so as to minimize the interfere nce of its performance by other readers. Installing Installation of RFID reader involves some processes. Tags are u sually attached to all products and mobile phones that are to be tracked. The cards, w hich are mostly made from pure tag-chip (integrated circuit), connected to the a ntenna(Want, 2006). Antenna readers of the RFID system are typically built fr om different types of tags like labels, security tags, apparel hang tags, asset tags from the industries. Furthermore, card chip has the memory system which typically keeps the items or the mobile’s Electronic Product Code (EPC). More so, tag chip also stores other useful information that makes it possible for the mobile device t o be tracked by RFID reader or read it from different areas with the help of inte rnet connection.
  • 18. Impact of Implementation – type of shipping/nation/worldwide 3 DESCRIPTION OF ADMINISTRATIVE PROCEDURES – HUMAN AND PROCESS CHANGES Mobile Phones Manufacturing Industry has Administrative proc edures in help to set rules and policies that eventually enable the company to manage its performance. Administrative procedures enable organization and workers to b e efficient, responsible, and accountable as well as more consistencies. 3 CHANGES IN ORGANIZATION POLICIES OR ENHANCEME NTS With the use of RFID system technologies, companies are force d to change their organizational policies and strategies so as to enhance the perfo rmance of the 4/23/2016 SafeAssign Originality Report https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde &includeDeleted=true&course_… 9/11
  • 19. scheme. Businesses or organizations are supposed to come up w ith specialized RFID task force which is responsible for defining, designing, and plan ning RFID strategies. Long-term strategies and policies must be developed so that labor costs and increased customer satisfaction can be achieved in future. Training requirements Implementation of RFID requires educating those people (worke rs and consumers) who are going to be involved in the implementation process. Bo th industry analysis and publication can help to create awareness of the importance of using RFID system technology to detect counterfeit mobile phones. Industry conferences can contribute to spreading the knowledge of RFID technology, and government can also educate people on the financial loss that is created by count erfeit businesses. Workers must be trained on any new software of devices that ha s been introduced into the firm processes by the management. Training employees also ensure that
  • 20. RFID strategies successively meet the organization's objectives and reduce operational risks. Maintenance of the system – Information Layer (storage), & Decoupling (field maintenance). Support of any software or devices is paramount so as to increas e their durability and working efficiency. Sometimes, lab management can be con structed so as to store RFID system. Information stored in RFID system should b e stored properly so as to minimize loss or cost of retrieving information. Devices in the field should be protected well to reduce blockage and unauthorized persons(Wa nt, 2006). More advanced storage of information should be developed such as w eb-based or internet information management. Working conditions of the RFID syste m in the field should be well studied because of their high standards which ca n demand high working conditions. Lastly, integrating much technological adva
  • 21. ncement in storage and handling of RFID system enables convenience and effective ness of information 4/23/2016 SafeAssign Originality Report https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde &includeDeleted=true&course… 10/11 management as well as flow. Conclusion 4 RESEARCH HAS REVEALED THAT THE USE OF RADIO FR EQUENCY IDENTIFICATION CAN ASSIST MUCH IN AN ATTEMPT TO SOLVE THE PROBLEM AND KEEP THE CONSUMERS SAFE FROM BEIN G CONNED INTO GETTING AND UTILIZING MOBILE PHONES THAT A RE COUNTERFEIT. References Clarke-Hill, P. J. 5 AND C., HILLIER, D., & COMFORT, D. (2005). 6 THE BENEFITS, CHALLENGES AND IMPACTS OF RADIO
  • 22. FREQUENCY IDENTIFICATION TECHNOLOGY (RFID) FOR RETAILERS IN THE UK. MARKETING INTELLIGENCE & P LANNING, 23(4), 395–402. 7 HTTP://DOI.ORG/10.1108/02634500510603492 Glasser, D. J., Goodman, K. W., & Einspruch, N. G. (2007). Chi ps, tags and scanners: 1 ETHICAL CHALLENGES FOR RADIO FREQUENCY IDENTIFICATION. Ethics and Information Technology. http://doi.org/10.1007/s10676-006-9124-0 Lee, D., Kim, S., Kim, H., & Park, N. (2010). Mobile platform f or networked RFID applications. In ITNG2010 - 7th International Conference on Inf ormation Technology: New Generations (pp. 625–630). http://doi.org/10.1109/ITNG.2010.188 Rizwan, M., Ali, A., Anjum, H., Naseer, M., Majeed, Z., Ali, M. A., & Anwar, A. (2014). Consumer’s Purchase Intention towards Counterfeit Mo bile Phones. Journal of Public Administration and Governance, 4(3), 75–89.
  • 23. http://doi.org/10.5296/jpag.v4i3.5850 Sari, K. (2010). 8 EXPLORING THE IMPACTS OF RADIO FREQUENCY 4/23/2016 SafeAssign Originality Report https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/origina lityReport?attemptId=843e379c-16f3-486c-a59d-9be3a871abde &includeDeleted=true&course… 11/11 IDENTIFICATION (RFID) TECHNOLOGY ON SUPPLY CHAI N PERFORMANCE. 9 EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 207(1), 174–183. 8 HTTP://DOI.ORG/10.1016/J.EJOR.2010.04.003 Want, R. (2006). 10 AN INTRODUCTION TO RFID TECHNOLOGY. IEEE Pervasive Computing. http://doi.org/10.1109/MPRV.2006.2 Stat170 - Introductory Statistics Semester 1, 2015 Assignment 2 Due Wednesday 20th May, 5.00pm via the iLearn link only
  • 24. Submit via the Assignment 2 link in the ASSESSMENTS area of iLearn. Instructions: 1) The answers to all questions are to be word processed into this document. You can either type formulae into your solution or you can use the equation editor in Word or you may include hand-written equations and diagrams by photographing them so that you have the image saved as a picture file and then pasting (inserting) the image/s into your solution. 2) Your assignment should be uploaded as a Word (.doc or .docx) or PDF file (created from a Word processed document) ONLY. Other formats, including a PDF created from an image, will not be accepted by the system. 3) Please note that iLearn is fairly reliable, but, like any website, it is occasionally unavailable for short periods. Therefore, do not wait until the due date/time to start trying to submit your work. If you have technical difficulties in submitting your Assignment, it is your responsibility to ensure these difficulties are resolved by the submission deadline. (The University has Help services to support you in the event of a problem; see http://ilearn.mq.edu.au/login/MQ/help.htm.) 4) No submissions will be accepted by email or other means. 5) When you think you have submitted your Assignment, please check to make sure that you have submitted the correct file: In iLearn, click on the Assignment, and you should see your uploaded files. 6) This Assignment is worth 12% of your total grade for STAT170. You may discuss the Assignment with your classmates if you wish, but must then complete all of the calculations and writing by yourself. Note: every semester, several students receive a mark of 0 for this Assignment, due to plagiarism. Ensure that you do not copy parts of your friends' Assignment submissions. Submitting your assignment via
  • 25. iLearn is a declaration that the work is your own. Information: This assignment is worth 12% and is marked out of 45. Penalties apply as follows: Submitted on Wednesday after 5pm: Deduct 10 marks Submitted on Thursday: Deduct 15 marks Submitted on Friday: Deduct 25 marks No assignments submitted after Friday will be accepted. Q1 Q2 Q3 Q4 Total 12 15 8 10 45 7) Question 1 (12 marks) The times taken to assemble a car in a manufacturing plant follow a normal distribution with a mean of 20 hours and a
  • 26. standard deviation of 2 hours. Use this information to answer the following questions. Show your working, including an appropriate diagram. a. Find the probability that a randomly selected car takes between 21 and 24 hours to assemble. b. Find the probability that the average assembly time for a randomly selected sample of 5 cars manufactured in the plant will be longer than 22 hours.
  • 27. c. 69% of new cars purchased in Australia have automatic transmission. Find the probability that less than 40 new cars from a random sample of 50 have automatic transmission. Question 2 (15 marks) In 2013, a study of 50 cruise ships was undertaken to investigate the variables which determine the crew size of a cruise ship. For each of the 50 cruise ships, information was recorded on their most recent cruise. Some of the variables recorded on each cruise ship are described below. Variable Name Variable Description Ship Name of cruise ship Age Age of the cruise ship in years as of 2013 Cabins Number of cabins Passengers Number of passengers on most recent cruise Crew Number of crew on most recent cruise The following output was constructed from information recorded on the age and the crew size of the 50 cruise ships in the study. Consider this output for parts a. to f.
  • 28. Regression Analysis: Crew versus Age Model Summary S R-sq R-sq(adj) R-sq(pred) 235.954 49.67% 48.62% 45.38% Coefficients Term Coef SE Coef T-Value P-Value VIF Constant 1301.3 87.2 14.92 0.000 Age -35.74 5.19 -6.88 0.000 1.00 Regression Equation Crew = 1301.3 - 35.74 Age Question 2 continued a. Comment on the relation between the age of a cruise ship and the number of crew employed on the ship: b. Did the oldest cruise ship have the largest crew size? c. What was the approximate age and crew size of the oldest cruise ship?
  • 29. d. 6 of the cruise ships were 12 years old. What was the approximate crew size of the 12 year old ship with the smallest crew size? e. The 12 year old cruise ship with the smallest crew size had the largest residual. Calculate the approximate value of this residual, using your results from part d. f. Write down one reason (referring specifically to relevant part of the output on the previous page) why a linear model may not be a good model for predicting the number of crew required on a cruise ship from the age of the cruise ship:
  • 30. Question 2 continued Now consider both the number of cabins and the number of passengers as possible predictors of the crew size. The following output was constructed from the 50 cruise ships in the sample. Use this information for the remainder of Question 4. Crew vs Cabins: Regression Analysis: Crew versus Cabins Model Summary S R-sq R-sq(adj) R-sq(pred) 81.3511 94.02% 93.89% 93.52% Coefficients Term Coef SE Coef T-Value P-Value Constant 96.6 26.3 3.67 0.001 Cabins 0.7791 0.0284 **** *****
  • 31. Crew vs Passengers: Regression Analysis: Crew versus Passengers Model Summary S R-sq R-sq(adj) R-sq(pred) 94.2836 91.96% 91.80% 91.15% Coefficients Term Coef SE Coef T-Value P-Value Constant 118.3 29.9 3.95 0.000 Passengers 0.3726 0.0159 23.44 0.000 Question 2 (continued) g. Carry out an appropriate hypothesis test, using any relevant information from the previous page, to answer the following research question. (You should comment on any test assumption/s but you can assume that assumption/s are reasonably well satisfied.) Research Question: Is the number of cabins on a cruise ship a useful predictor for the crew size? Hypothesis Test:
  • 32. h. Now consider the following research question: Research Question: Is there a significant linear relation between the number of passengers on a cruise ship and the crew size required? Calculate a 95% confidence interval to estimate the population slope of the line which relates the number of passengers and the
  • 33. crew size of a cruise ship. Interpret your interval in order to answer the research question. Note that the assumptions are satisfied for this linear model (see scatter plot and residual plots) – you do not need to comment on these here). i. Confidence Interval: ii. Conclusion: . Medical researchers carried out a study to compare various methods of pain relief for patients suffering different types of pain. 115 patients who took part in this study to test the effectiveness of slow release ‘pain patches’ applied directly to the skin. 52 of these subjects suffered from chronic back pain while the other 63 subjects were chronic migraine sufferers. Each subject had pain scores recorded before and again 2 hours after applying the ‘pain patch’ to the skin. Pain scores were a self-assessed score out of 10. A score of 0 indicated no pain and a score of 10 would indicate the most extreme possible pain. Questions 3 to 5 are based on this study. Variable Description ID ID number for patient Condition Medical Condition: 1 = Back pain, 2 = Migraine PainScoreBefore Self-assessed pain score before pain patch treatment applied PainScoreAfter Self-assessed pain score 2 hours after pain patch treatment applied Question 3 (8 marks) Using appropriate parts of the following output which was constructed using the results of this study to carry out a
  • 34. hypothesis test in the space provided on the following page to answer this research question: Research Question: Do self-assessed pain scores two hours after applying pain patches differ, on average, between patients suffering back pain and patients suffering with migraine. Descriptive Statistics: PainScoreAfter_Back, PainScoreAfter_Migraine Variable N Mean SE Mean StDev Minimum Median Maximum PainScoreAfter_Back 52 5.933 0.155 1.116 3.500 6.000 8.500 PainScoreAfter_Migraine 63 4.999 0.118 0.938 3.000 5.000 7.000
  • 35. Question 3 Hypothesis Test: Question 4 (10 marks) Research Question: Is there a significant change in self-assessed pain scores two hours after applying ‘pain patches’ to the skin for migraine sufferers? a. The file, PainScores.mtw, which is available on iLearn, contains some of the data from the study described on page 6. Use these data to carry out an appropriate hypothesis test to answer this research question above. b. Copy and paste appropriate Minitab output for this test, along with appropriate graphical summaries onto the following page. All Minitab output should be neatly presented and clearly labelled. Marks will be deducted for summaries which do not have appropriate titles and labels. c. Write a report addressing the research question above on the page provided. Refer to the document ‘A Guide to Report Writing’ and, in particular, to the section headed ‘A Short Guide to Report Writing for STAT170 students’ which is
  • 36. provided on iLearn. Your report should be based on the results of an appropriate hypothesis tests as directed in this guide. Your report not exceed one A4 page and should be word- processed and presentedon the page provided. It should include the following headings: Introduction Methods Results Conclusion Assignment 1 8 STAT170 Assignment 2 Session 1 2015 2000-200-400-600 14 12 10 8 6 4 2 0 Residual F r e q u e n c
  • 37. y Histogram (response is Crew) 180016001400120010008006004002000 1400 1200 1000 800 600 400 200 0 Cabins C r e w Scatterplot of Crew vs Cabins 1400120010008006004002000 200 100 0 -100 -200 Fitted Value R e s i d u a l Versus Fits (response is Crew) 160800-80-160
  • 39. 1400120010008006004002000 200 100 0 -100 -200 -300 Fitted Value R e s i d u a l Versus Fits (response is Crew) 1000-100-200 16 14 12 10 8 6 4 2 0 Residual F r e q u e n
  • 41. 6 5 4 3 D a t a Boxplot of PainScoreAfter_Back, PainScoreAfter_Migraine 403530252015105 1400 1200 1000 800 600 400 200 0 Age C r e w Scatterplot of Crew vs Age 120010008006004002000 400 200 0 -200 -400 -600 Fitted Value R e s i
  • 42. d u a l Versus Fits (response is Crew) Running Head: MOBILE PHONES MANUFACTURING INDUSTRY 1 MOBILE PHONES MANUFACTURING INDUSTRY 2 Mobile Phones Manufacturing Industry
  • 43. Introduction The use of the RFID is a technique that is not new. It had been used as early as during the world war two. This technique has been received positively by the different firm since it assists in the process of management and conducting of their businesses. THE EXECUTIVE SUMMARY ON THE INDUSTRY AND THE BUSINESS PROBLEM THAT IS TO BE SOLVED Mobile phones manufacturing industry For over a long period of time, the mobile phones manufacturing industry has faced some challenges. Among them being the prominent issue of counterfeits. There has been a mass production of many counterfeit mobile phones in the whole world. There are many Chinese companies which have come up and with little capital, they have been able to produce and distribute some counterfeit products in the whole world. These products usually have the same design as the original products. They are also given names that can confuse the unsuspecting buyers. The other key important thing about these products is that they are usually sold to the market at relatively lower prices as compared to the original mobile phones (Motorola.com, 2007). These companies that are involved in the making of the phones also tend to use technology that resembles to a much extent the ones that are used by the companies that deal with the manufacture of genuine mobile phones such as the Apple Company which manufactures IPhones. The IPhones have their counterfeit in the market, and they go by the name Hi-Phone. This means that an unsuspecting customer will buy the phone thinking that it is that which has been made by the Apple Company. The majority of these mobile phones are also complaining of being given substandard products. These counterfeits in most cases are usually made of low- quality technology and as a result, they are also among the products with the poorest qualities. The production and distribution of the counterfeit products have brought a lot of the negative consequences to the industry as a whole
  • 44. (Motorola.com, 2007). To start with, a lot of revenue is always lost to those companies which produce and sell the counterfeit products. It also contributes much to reducing the amount of income that the companies such as the Apple Company which produces genuine products get from the sale of their goods. Such loss of revenue makes it difficult for some of the companies to fully operate and can even lead to other companies falling out of the business. The other effect of the sale of the counterfeit goods is that since the home companies are reducing the amount of revenue that they get from the sale of their products, they are likely to not to provide better services to their employees, and at times, they are likely to kick out some of them. The industries which have been thriving for a long time is now facing numerous counterfeit problems that have made even some of them to think about investing in other things and to shy totally away from the manufacture of mobile phones. Research has however revealed that the use of Radio Frequency Identification can assist much in an attempt to solve the problem and keep the consumers safe from being conned into getting and utilizing goods that are counterfeit. The use of the Radio Frequency Identification (RFID) to handle the issue of counterfeits Most of the mobile phones manufacturing companies can take advantage of this technology since it is the only promising way of making it easier for the identification and control of the spread and consumption of the counterfeit mobile phones by the consumers who are unsuspecting. Most of the manufacturers of the mobile phone companies can integrate and use the radio frequency identification techniques and mount the small chips in the phones. The companies can also use the technologies in the different spare parts of the mobile phones that they have produced so that they can be easily distinguished from the counterfeit ones that are continuing to circulate in the markets (Motorola.com, 2007).
  • 45. This will make it easier for the identification of the counterfeit mobile phones in the market. The companies should subsequently have their representatives in the different markets who are serving the purpose of assisting in the identification of the products. The RFID technology will make it easier for the distinction to be made between those original products and the counterfeit ones (Motorola.com, 2007). This is the sure way that the companies can take advantage of the technology and incorporate it with the aim of ensuring that they control all the goods that are produced in the market. The companies can also liaise with different governments who so that they assist them in blocking the counterfeit goods from being spread in the markets. Conclusion To conclude, by incorporating the RFID technology, the mobile phones will not only be able to solve the problem of production of the counterfeit goods and the subsequent distribution of the same goods in the market, they will also be in a position to effectively monitor their inventories in a way that they will be able to check how their goods are flowing in different parts of the market. This technology will go ahead ensuring that the necessary authorities and the mobile phone manufacturers are in a position to identify and sensitize the different customers of the different counterfeit products that are in the market. They can also educate them on the different ways that they can use to identify the fake products. Reference Motorola.com (2007) Business Benefits from Radio Frequency Identification (RFID) Final Paper Checklist
  • 46. What is the problem in my industry? General description of the business problem Overview of RFID (Basics/Advances) Business Justification - Business Process Integration (BPI)
  • 47. Benefits and Disadvantages Planning Security Concerns - (Privacy/Middleware/Information Safekeeping/Data Access, Transition & Operations, Authentication & Authorization – user ID/password Purchasing Installing
  • 48. Impact of Implementation – type of shipping/nation/worldwide Description of administrative procedures – Human and Process changes Changes in Organization Policies or Enhancements
  • 49. Training requirements Maintenance of the system – Information Layer (storage), & Decoupling (field maintenance). Running Head: MOBILE PHONES MANUFACTURING INDUSTRY 1 MOBILE PHONES MANUFACTURING INDUSTRY 5 Mobile Phones Manufacturing Industry
  • 50. The RFID is one of the many technologies that have been existing since the time memorial. The technology was innovated and implemented to ensure that there exist a technology that would ensure security, efficiency and time saving. The technology has been seen relevant in many companies and its impact felt and accepted by all. The paper is going to explain on the different ways in which the RFID has been established and used in the mobile manufacturing and distribution industry. Mobile phones manufacturing industry Any company should involve planning before starting producing its products. The mobile manufacturing industry being not an exceptional, it includes planning in its process of production. The planning in the mobile and manufacturing industry applies RFID. RFID is used in this case to make some important decisions on pricing, timing and other basic logistics in the mobile manufacturing industry (Shepard, 2005). Many companies are now applying the RFID to make accurate decisions. In the manufacturing process of the mobile, RFID is used before and during the manufacturing process in the goods application for example. During manufacturing, the raw material is inputted into the system using a case known as the pallet-level RFID. The next material that follows is the tracking material that is inputted to determine whether the manufacturing set is possible.
  • 51. The tracking material identifies the items that pass the critical step in the manufacturing process. The real-time information obtained is used the brand owners easy to track down the manufacturing process. The RFID give accurate records that can be used for future planning and budgeting. The records are also used to minimize errors since the information obtained can be used to identify where the problem occurred in the past the company can correct them and thus coming up with the best quality mobile phones. The RFID is also used in counterfeit detection. The RFID is used to generate IDs that they feed to the genuine item. The IDs fed to the genuine devices are used to detect the genuine devices in the market and turning down any counterfeit mobile phones. In most cases, the planning process is up to 10% inaccurate. The inaccuracy makes it impossible for estimation of the material used in the manufacturing of the mobile phones. The inaccuracy may at times result in ordering extra products or less. The extra bought products may end up in losses and even make the manufacturing industry run at a loss of up to 10%. RFID is now working in ensuring that the material imported and fed into the system are accurately and thus the expected result is of high quality. The RFID lowers the production cost by ensuring that the raw material used are accurately measure, such that there exist no access nor less. The mobile RFID is among the well- established tools of in establishing accurate shipment. The RFID is used in the picking and packing in the manufacturing company (Juels, 2006). During picking, the mobile devices are packed by identifying not only the brand size, shape and even color. The identification and sorting are made possible by the use of the RFID. The technology also provides the electronic packing list which initially was done manually. The RFID has helped in time-saving since it simplifies the packing and generating the packing list. The brand owner receives the electronic information right from the market without necessarily count checking on the electronics packed. The RFID also gives summary information on the entire transport time. The
  • 52. information is used to answer any question a customer may have. The information provided saves time that the supplier of electronic could take explaining to the buyer. The RFID uses fixed readers that provide a most feasible solution. The readers promote production short time production in the manufacturing industry. Most manufacturers who carry out short-term contracts makes the RFID fixed readers (Ni, Liu, Lau, & Patil, 2004). When a new contract starts, the owner send information to the mobile RFID readers which makes the process easy to move. Mobile manufacturing industry cannot be complete if the transport and distribution are not mentioned. Tracking of the electronics is very important since the goods in transit require security for the manufacturing industry to avoid any possible losses that may occur during the process of transit. In the process of transportation, the packages are identified and information of each goods and time stamp provided. Reading is usually done depending on the position where the package is loaded. The reading is done depending on whether the goods are being unloaded or loaded. On transportation, the RFID records information on the goods being transported. The RFID creates an accurate export or import documents. The RFID also aids in the customs operation. The EPC code generated has the code of the country of origin. The customs official uses the code generated by the RFID to identify the country of origin. By identifying the country of origin, of the product result in determining, and minimizing the cases of counterfeit. The RFID is a new technology in the supply chain management which has its main objective of replacing the past barcodes. The RFID ensures that correct products are designated at the right place at the right time. It has caused a massive revolution in the supply chain management department. RFID has promoted the accuracy thus eliminating the discrepancies to zero. It RFID has created excellent efficiency, precision, and reliability. It also provides relevant real-time information which supports
  • 53. effective planning and administration processes. The practical decision being a core factor that influences the production and marketing process (Finkenzeller, 2003). If it is well done, the industry will experience a transformation regarding profits made by a given organization. References Finkenzeller, K., & Handbook, R. F. I. D. (1999). Radio- frequency identification fundamentals and applications. Chippenham: John Wiley & Son. Finkenzeller, K. (2003). BOOK TOOLS. Ni, L. M., Liu, Y., Lau, Y. C., & Patil, A. P. (2004). LANDMARC: Indoor location sensing using active RFID. Wireless Networks, 10(6), 701-710. Shepard, S. (2005). RFID: radio frequency identification. McGraw-Hill Professional. Juels, A. (2006). RFID security and privacy: A research survey. Selected Areas in Communications, IEEE Journal on, 24(2), 381-394.