• Title/Summary/Keyword: 무선인식기술

Search Result 531, Processing Time 0.031 seconds

Dangerous Area Prediction Technique for Preventing Disaster based on Outside Sensor Network (실외 센서네트워크 기반 재해방지 시스템을 위한 위험지역 예측기법)

  • Jung, Young-Jin;Kim, Hak-Cheol;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.6 s.109
    • /
    • pp.775-788
    • /
    • 2006
  • Many disaster monitoring systems are constantly studied to prevent disasters such as environmental pollution, the breaking of a tunnel and a building, flooding, storm earthquake according to the progress of wireless telecommunication, the miniaturization of terminal devices, and the spread of sensor network. A disaster monitoring system can extract information of a remote place, process sensor data with rules to recognize disaster situation, and provide work for preventing disaster. However existing monitoring systems are not enough to predict and prevent disaster, because they can only process current sensor data through utilizing simple aggregation function and operators. In this paper, we design and implement a disaster prevention system to predict near future dangerous area through using outside sensor network and spatial Information. The provided prediction technique considers the change of spatial information over time with current sensor data, and indicates the place that could be dangerous in near future. The system can recognize which place would be dangerous and prepare the disaster prevention. Therefore, damage of disaster and cost of recovery would be reduced. The provided disaster prevention system and prediction technique could be applied to various disaster prevention systems and be utilized for preventing disaster and reducing damages.

Performance Analysis of RFID Interference Suppression System Based on the Gold Code (골드 코드 기반의 RFID 간섭제거 시스템 성능분석)

  • khadka, Grishma;Hwang, Suk-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1491-1497
    • /
    • 2013
  • Radio frequency identification (RFID) is an important and essential components of ubiquitous computing, with the development of wireless communication technologies and mobile computing environment. Recently, RFID becomes the mainstream application that helps fast handling and uniquely identifying the physical objects. It utilizes the electromagnetic energy for data transmission from a tag to a reader in the presence of arbitrary interference and noise. In order to employ the portable mobile RFID reader, a tag-collision problem between two or more adjacent tags should be considered. In this paper, we present the operation of RFID system in which numerous tags are present in the interrogation zone of a single reader at the same time. Since there may exist a number of tagged objects in the narrow area, multiple RFID tags may interfere each other, caused to degrade the data reliability and efficiency of the RFID system. In order to suppress interference signals from multiple neighboring tags, we present an application of Gold code for RFID communication system, which uses spread spectrum technique. In this RFID system, data bits are spreaded in each tags with the unique Gold code and the spreaded data bits are despreaded in the reader with the same Gold code. The performance analysis of the considered RFID anti-collision system is illustrated via computer simulation examples.

High Quality Video Streaming System in Ultra-Low Latency over 5G-MEC (5G-MEC 기반 초저지연 고화질 영상 전송 시스템)

  • Kim, Jeongseok;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.2
    • /
    • pp.29-38
    • /
    • 2021
  • The Internet including mobile networks is developing to overcoming the limitation of physical distance and providing or acquiring information from remote locations. However, the systems that use video as primary information require higher bandwidth for recognizing the situation in remote places more accurately through high-quality video as well as lower latency for faster interaction between devices and users. The emergence of the 5th generation mobile network provides features such as high bandwidth and precise location recognition that were not experienced in previous-generation technologies. In addition, the Mobile Edge Computing that minimizes network latency in the mobile network requires a change in the traditional system architecture that was composed of the existing smart device and high availability server system. However, even with 5G and MEC, since there is a limit to overcome the mobile network state fluctuations only by enhancing the network infrastructure, this study proposes a high-definition video streaming system in ultra-low latency based on the SRT protocol that provides Forward Error Correction and Fast Retransmission. The proposed system shows how to deploy software components that are developed in consideration of the nature of 5G and MEC to achieve sub-1 second latency for 4K real-time video streaming. In the last of this paper, we analyze the most significant factor in the entire video transmission process to achieve the lowest possible latency.

Design and Application of a LonRF Device based Sensor Network for an Ubiquitous Home Network (유비쿼터스 홈네트워크를 위한 LonRF 디바이스 기반의 센서 네트워크 설계 및 응용)

  • Ro Kwang-Hyun;Lee Byung-Bog;Park Ae-Soon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.7 no.3
    • /
    • pp.87-94
    • /
    • 2006
  • For realizing an ubiquitous home network(uHome-net), various sensors should be able to be connected to an integrated wire/wireless sensor network. This paper describes an application case of applying LonWorks technology being widely used in control network to wire/wireless sensor network in uHome-net and the design and application of LonRF device that consists of a neuron chip including LonTalk protocol, a 433.92MHz RF transceiver, a sensor, and application programs. As an application example of the LonRF device, the LonRF smart badge that can measure the 3D location of objects in indoor environment and interwork with the uHome-net was developed. LonRF device based home network services were realized on the uHome-net testbed such as indoor positioning service, remote surveillance service and remote metering service were realized. This research shows that LonWorks technology based sensor network could be applicable to the control network in an ubiquitous home network and the LonRF device can be used as a wireless node in various sensor networks.

  • PDF

Implementation of AP-Based and RFID-Based Indoor Positioning Web Services (공유기 및 RFID를 이용한 옥내 측위 웹 서비스 구현)

  • Han, Chang-Yong;Lee, Gye-Young;Yim, Jae-Geol;Shim, Kyu-Bark
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.1
    • /
    • pp.71-80
    • /
    • 2012
  • LBS (Location Based Service) services are very useful to our daily life and it should be available inside a building: a huge building, a shopping mall, a large scale underground shopping center, and so on where GPS (Global Positioning System) signal is not available. An LBS which is provided inside a building is called an ILBS (Indoor Location Based Service). One of the most important techniques for ILBS development is indoor positioning. Among the indoor positioning techniques, APs (access points) of WLAN based ones are most economical because WLAN is available almost everywhere. Meanwhile, the web service has been proved to be an excellent practice of software reuse. Therefore, if indoor positioning is provided in the form of web service to programmers then development of ILBS would be greatly accelerated. This paper introduces the AP based trilateration and K-NN indoor positioning and RFID based indoor positioning web services we have developed.

Spectrum Co-existence Method using Orthogonal Beamforming in Cognitive Radio Systems (코그니티브 라디오 시스템에서의 직교 빔을 이용한 주파수 공유 방법)

  • Kwon, Yang-Soo;Yoo, Jae-Ho;Lee, Il-Shin;Chung, Jae-Hak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11A
    • /
    • pp.1013-1020
    • /
    • 2008
  • Cognitive radio(CR) techniques have been considered as a strong solution of frequency scarcity due to the limitation of frequency resource, In this paper, an orthogonal beamforming method is proposed that enables cognitive radio systems to coexist with a primary users' system in the same spectrum and region without causing interference to primary systems. The orthogonal multiple beams for multi-users of CR systems are obtained through the generation of orthogonal subspaces from primary users' channel state information. To increase the sum-rate of the CR systems, the proposed scheme adopts opportunistic radio resource allocation techniques. Simulation results provides that the proposed scheme achieves 2.72bps/Hz, the sum-rate capacity at 20 cognitive users in an area with two antennas at the cognitive radio basestation.

The Development of Attendance Management System Using the RFID (RFID를 이용한 출석관리 시스템 개발)

  • Park, So-Hee;Moon, Byeong-Cheoul
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.2
    • /
    • pp.139-146
    • /
    • 2007
  • Today, using RFID(Radio Frequency Identification) card is extended in diversity as medical treatment, circulation market, military affairs, manufacture, security, etc. The RFID technology is an automatic identification method, relying on storing and remotely retrieving data for the purpose of identification using radio waves. This advantage of the RFID will be as a replacement for traditional Barcoding. Besides, book-lending system and attendance management system become the center of educational institution in interest. This paper presents a attendance management system using the RFID card which provides directly information of attendance for professors with mobile and students with web. Also, the students only have ID card that embed RFID tag which is recognized attendance through DB that storages to is received a information of student from RFID card Reader. And it is possible management or report for attendance and time table not only for professors by management program but also for students by web program.

  • PDF

Design of Small-Area and High-Reliability 512-Bit EEPROM IP for UHF RFID Tag Chips (UHF RFID Tag Chip용 저면적·고신뢰성 512bit EEPROM IP 설계)

  • Lee, Dong-Hoon;Jin, Liyan;Jang, Ji-Hye;Ha, Pan-Bong;Kim, Young-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.2
    • /
    • pp.302-312
    • /
    • 2012
  • In this paper, small-area and high-reliability design techniques of a 512-bit EEPROM are designed for UHF RFID tag chips. For a small-area technique, there are a WL driver circuit simplifying its decoding logic and a VREF generator using a resistor divider instead of a BGR. The layout size of the designed 512-bit EEPROM IP with MagnaChip's $0.18{\mu}m$ EEPROM is $59.465{\mu}m{\times}366.76{\mu}m$ which is 16.7% smaller than the conventional counterpart. Also, we solve a problem of breaking 5V devices by keeping VDDP voltage constant since a boosted output from a DC-DC converter is made discharge to the common ground VSS instead of VDDP (=3.15V) in getting out of the write mode.

Improved RFID Authentication Protocol Providing Mutual Authentication (상호인증을 제공하는 개선된 RFID 인증 프로토콜)

  • Jeon, Seo-Kwan;Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.113-120
    • /
    • 2010
  • RFID system is the contact-less recognition technology and use for distribution system, environment, transport, security and so on. However, it may create many security relevant problems such as privacy because constraints of RFID communication environment. So several methods of resolving these problems have been proposed. Recently, Shin and Park proposed an efficient RFID authentication protocol with protecting user's privacy using hash function and exclusive-OR.. But Ahn and Bu et al. poia problem that a attacker can to masquerade as malicious reader because their protocol can't providing mutual authentication.nted out weakness of Shin and Park's protocol and proposed more secure and efficient protocol. Unfortunately, Ahn and But's protocol has In this paper, We propose an improved RFID authentication protocol providing mutual authentication. The proposed protocol has advantages that providing mutual authentication between a tag and a reader, secure against replay attack and spoofing attack. Also, it guarantees anonymity of RFID tag and secure against location tracking attack by collusion of malicious readers.

Application of RFID System for MES Enhancement -Focused on EPCIS Expended Model- (MES개선을 위한 RFID 적용 -EPCIS 확장모형을 중심으로-)

  • Choi, Weon-Yong;Rhee, Jong-Tae
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.333-345
    • /
    • 2007
  • In the recent years, the companies have manually recorded a production status in a work diary or have mainly used a bar code in order to collect each process's progress status, production performance and quality information in the production and logistics process in real time. But, it requires an additional work because the worker's record must be daily checked or the worker must read it with the bar code scanner. At this time, data's accuracy is decreased owing to the worker's intention or mistake, and it causes the problem of the system's reliability. Accordingly, in order to solve such problem, the companies have introduced RFID which comes into the spotlight in the latest automatic identification field. RFID is an automatic identification technology by radio communication technology that allows us to identify or record information without contacting the corresponding object, and as Gen2 and EPCIS, EPCglobal's standard tag for RFID, have recently been established, it will be introduced to the whole computation industry. This study suggests RFID type Modeling Notation for analyzing logistics flow to improve MES focusing on extended model of EPCIS, and EPCISEvent Template in manufacturing industry.