As mentioned earlier, every application has its
own characteristics and requirements for ADCS.
Therefore more application specific studies must be
made with each area of intended use in mind. In
supply chain management the supply chain must be
accurately studied, because even supply chains for
different products may have very different needs. In
AMR systems the metering environment and needs
must be strictly surveyed to achieve an optimal
outcome. Therefore this study will be continued with
a more accurate definition of the supply chain in the
paper reel industry and implementation of an RFID-
based ADCS in the paper industry environment.
Also the security issues such as user authentication
methods will be studied more deeply to determine
the procedure options and requirements for adding
new parts and partners to ADCS.
REFERENCES
Allman, M., et. al. (1999). IETF Standards Track, RFC
2581, “TCP Congestion Control”.
<http://www.ietf.org/rfc/rfc2581.txt>. The Internet
Engineering Task Force. Accessed 7 Aug. 2007.
Bodrozic, L., Stipanicev, D., Stula, M. (2006). “Agent
based data collecting in forest fire monitoring system”.
International Conference on Software in
Telecommunications and Computer Networks, 2006.
SoftCOM 2006. Sept. 29 – Oct. 1 2006. IEEE.
Page(s): 326 – 330.
Jie, W., Hung, T., Turner, S. J., Cai, W. (2006).
“Architecture Model for Information Service in Large
Scale Grid Environments”. Proceedings of the Sixth
IEEE International Symposium, on Cluster Computing
and the Grid 2006. CCGRID ’06. Volume 1, 16-19
May 2006, IEEE. Pages: 107-114.
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.
(2002). “SPINS: Security Protocols for Sensor
Networks”. Wireless Networks Journal, Volume 8,
Issue 5 (Sept. 2002). Pages: 521-534. Springer
Netherlands.
Sikkilä, H., Soini, M., Oksa, P., Sydänheimo, L.,
Kivikoski, M. (2006). ”KILAVI Wireless
Communication Protocol for the Building
Environment – Security Issues”. IEEE Tenth
International Symposium on Consumer Electronics,
2006. ISCE ’06. IEEE.
Soini, M., Sikkilä, H., Oksa, P., Sydänheimo, L.,
Kivikoski, M. (2006). ”KILAVI Wireless
Communication Protocol for the Building
Environment – Networking Issues”. IEEE Tenth
International Symposium on Consumer Electronics,
2006. ISCE ’06. IEEE.
Transmission Control Protocol (1981). IETF Standards
Track, RFC 793. “Transmission Control Protocol”.
<http://tools.ietf.org/rfc/rfc793.txt>. The Internet
Engineering Task Force, September 1981. Accessed
20 Aug. 2007.
Wang, K., Su, R., Li, Z., Cai, Z., Zhou, L. (2005). “Study
of Secure Complicated Information System
Architecture Model”. Proceedings of the First IEEE
International Conference on Semantics, Knowledge
and Grid, 2005. SKG’05. IEEE, Nov 2005. Page(s):
101-101.
Wang, S. Y., Chou, C. L., Huang, C. H., Hwang, C. C.,
Yang, Z. M., Chiou, C. C., Lin, C. C. (2003). “The
Design and Implementation of the NCTUns 1.0
Network Simulator”. Computer Networks, Vol. 42,
Issue 2, June 2003, Page(s): 175-197
Wikipedia, The Free Encyclopedia (Updated 24.7.2007).
“TCP Congestion Avoidance Algorithm”. [Online],
Available:
http://en.wikipedia.org/wiki/TCP_congestion_avoidan
ce_algorithm. Accessed 13 Aug. 2007.
Yu, L., Wang, N., Meng, X. (2005). “Real-time Forest
Fire Detection with Wireless Sensor Networks”.
Proceedings on IEEE International Conference on
Wireless Communication, Networking and Mobile
Computing, 2005. IEEE, Volume 2, 23-26 Sept. 2005
Page(s): 1214 – 1217.
COMPARISON OF DIFFERENT INFORMATION FLOW ARCHITECTURES IN AUTOMATED DATA
COLLECTION SYSTEMS
61