• Title/Summary/Keyword: 무선인식기술

Search Result 531, Processing Time 0.031 seconds

A Novel Carrier Leakage Suppression Scheme for UHF RFID Reader (UHF 대역 RFID 리더 반송파 누설 억압 연구)

  • Jung, Jae-Young;Park, Chan-Won;Yeom, Kyung-Whan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.4
    • /
    • pp.489-499
    • /
    • 2011
  • RFID technologies, which allow collecting, storing, processing, and tracking information by wirelessly recognizing the inherent ID of object through an attached electronic tag, have a variety of application areas. This paper presents a novel carrier leakage suppression RF(CLS-RF) front-end for ultra-high-frequency RF identification reader. The proposed reader CLS-RF front-end structure generates the carrier leakage replica through the nonlinear path that contains limiter. The limiting function only preserves the frequency and phase information of the leakage signal and rejects the amplitude modulated tag signal in the envelope. The carrier leakage replica is then injected into the linear path that contains phase shifter. Therefore, the carrier leakage signal is effectively cancelled out, while not affecting the gain of the desired tag backscattering signal. We experimentally confirm that the prototype shows a significant improvement in the leakage to signal ratio by up to 36 dB in 910 MHz, which is consistent with our simulation results.

Implemention of Refrigerator Application using NFC (NFC를 이용한 냉장고 Application 구현)

  • Ham, Ji-Hun;Yun, Min-Gyu;Han, Jung-Woo;Kim, Tae Yong;Jang, Won-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.570-572
    • /
    • 2015
  • NFC (Near Field Communication) is an area of the RFID technology is a kind of short-range wireless communication. NFC technology is to utilize the data transfer, the access control system is usefully employed in many fields, such as mobile payment. Recently smartphone application development using NFC is activated, recognition of the convenience of the current NFC tag is insignificant state. In this paper, it is the content of the Application that was created in order to provide the knowledge of convenience food to the customer to visit the mart. Users with Mart, using smartphones, at a NFC tag that is attached to the food display stand food information, purchasing tips, keeping method, data such efficacy is provided over the screen of the smartphone. If you purchased the food is placed in the refrigerator "moves to the food list of application to click the button, through the food list screen their food list in the refrigerator, and by providing information such as expiration date, the user There is help me to be able to buy the more convenient food.

  • PDF

Design and Implementation of Web based Traceability Management System for Logistics Vehicle using GPS and RFID (GPS 및 RFID를 이용한 웹 기반 물류차량 이력관리 시스템 설계 및 구현)

  • Jung, Se-Hoon;Sim, Chun-Bo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2737-2746
    • /
    • 2010
  • Recently, Logistics industry has emerged a new u-logistics paradigm combines USN / RFID technology. In this paper offers a vehicle history Web-based logistics management system based on the u-logistics paradigm. The design of this system is considered all events processes as a form of recycling and entire system is to modeling based UML of object oriented. Also It was undergone some process to make sure by logistics vehicles identified that RFID based was identified vehicle logistics. To identify logistics vehicle based RFID, identified the logistics vehicles is a process that will determine. The implementation method designed the interface based web which uses in the manager to C/S methods, consideration of the mobility of the system user implements the user GUI based PDA. As well as, In this paper was separated customer, manufacturer, distributor, administrator, drivers, respectively and focuses to raise a system reusability which is implementation by separately for each feature.

Reliable Time Synchronization Protocol in Sensor Networks (센서 네트워크에서 신뢰성 있는 시각 동기 프로토콜)

  • Hwang So-Young;Jung Yeon-Su;Baek Yun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3A
    • /
    • pp.274-281
    • /
    • 2006
  • Sensor network applications need synchronized time extremely such as object tracking, consistent state updates, duplicate detection, and temporal order delivery. This paper describes reliable time synchronization protocol (RTSP) for wireless sensor networks. In the proposed method, synchronization error is decreased by creating hierarchical tree with lower depth and reliability is improved by maintaining and updating information of candidate parent nodes. The RTSP reduces recovery time and communication overheads comparing to TPSN when there are topology changes owing to moving of nodes, running out of energy and physical crashes. Simulation results show that RTSP has about 20% better performance than TPSN in synchronization accuracy. And the number of message in the RTSP is $20%{\sim}60%$ lower than that in the TPSN when nodes are failed in the network. In case of different transmission range of nodes, the communication overhead in the RTSP is reduced up to 40% than that in the TPSN at the maximum.

Pedestrian Positioning Method using Multi-Level Transmission Signal Strength (다단계 전송 신호 강도 기술을 이용한 보행자 위치 측정 방법)

  • Lee, Myung-Su;Kim, Ju-Won;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.124-131
    • /
    • 2015
  • In this paper, we proposed indoor positioning system using RSS(Received Signal Strength) positioning method and TSS(Transmission Signal Strength). The main point in the paper is to improve reliability of accuracy positioning with the area recognition algorithm and probabilistic algorithm, which can be effectively used indoor. In the test in 1-dimensional or 2-dimensional spaces, also we checked effective positioning system considered environment of propagation that is changed by reflection, refraction and multipath in according to space form. It is necessary to find place where urgent situation happen and quickly to respond the situation for patients or the weak. Therefore, we expect the positioning system proposed can apply to the field of traffic IT.

IEEE 802.11a Interference Suppression Method Using by SVD Algorithm in LR-UWB Systems (LR-UWB 시스템에서 특이값 분해를 이용한 IEEE 802.11a 간섭억압기법)

  • Kim, Dong-Hee;Kim, Tae-Hun;Jang, Hong-Mo;Park, Ho-Hwan;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1A
    • /
    • pp.74-84
    • /
    • 2008
  • UWB radio systems have drawn attention during the last few years. These systems are the core technique for ubiquitous home and enable to co-exist with other narrow band systems over the same frequency without interfering them. But UWB signals have a very low power per pulse, so they are affected by strong narrow band interferences. Specially, IEEE 802.11a systems which operate around 5GHz overlap the band of UWB signals and they will interfere with UWB systems significantly. In this paper, we propose a novel narrow band interference suppression method based on singular value decomposition(SVD) algorithm for DS-UWB in IEEE 802.15.4a channel model. The proposed method is very effective and robust for both a single user DS-UWB system and a multiuser DS-UWB system to reduce the narrow band interference.

A Study of Privacy Protection Awareness of Mobile Phone Users (휴대폰 사용자의 개인정보 보호 의식 연구)

  • Rhee, Hae-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.386-394
    • /
    • 2008
  • Adoption of wireless communication facilities in mobile devices leads to increased vulnerability in individual privacy. One of such cases was discovered when a smart mobile phone of Paris Hilton at Oscar Award Ceremony was hacked a Swedish group of hackers. In this study, I wondered what sort of personal information could be exposed to hackers in such cases. In the course of survey, it was recognized that technical analysis of flash memory in mobile devices to check what kinds of data are stored there is technically almost impossible, since they are usually built in a proprietary manner. No generic tools could apply to discover their contents. Having recognized technical difficulties, it was inevitable to resort to a questionnaire survey to see awareness level with regard to personal privacy. We collected response from three hundred respondents by posting the questionnaire at World Survey on-line research site. What we have discovered was quite astonishing that even personal residence registration numbers have been found from nine of every ten respondents. Other data revealed include phone numbers, names, and personal bank accounts.

Implementation of VLC transceiver module using USB OTG (USB OTG를 이용한 VLC 송·수신 모듈 구현)

  • Lee, Jong-Sung;Lee, Dae-Hee;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.668-670
    • /
    • 2017
  • Visible Light Communication, which is promising as a next generation near field wireless communications, has been increased study and application case due to the development of LED technology. However, there are few application cases to IoT service due to the necessity of separate equipment for communication and limitation of light transmission to obstacles. In this paper, it propose a portable VLC transceiver module that can be connected to USB OTG and dedicated application for control to realization position possible necessary technique. The string input from the dedicated application is sent to the VLC module via USB OTG to transmit and receive data between the modules. As string transmission experiment result, it is confirmed that ASCII code transmission between VLC transceiver modules is possible through control of the implemented dedicated application.

  • PDF

Polygon-shaped Filters in Frequency Domain for Practical Filtering of Images (현실적 영상 필터링 방법을 위한 주파수 영역에서의 다각형 형태 필터의 모델링)

  • Kim, Ju-O;Kim, Ji-Su;Park, Cheol-Hyeong;Lee, Deok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.3
    • /
    • pp.1-7
    • /
    • 2019
  • In this paper, we propose an approach to design a practical filter and a mathematical modeling for images. In the areas of signal processing, including high-dimensional image processing, the filtering process has been fundamental and crucial in diverse practical applications such as image processing, computer vision, and pattern recognition. In general, the ideal filter is modeled as circular-shaped in the 2D frequency domain as the rectangular shape is ideal for the 1D frequency domain. This paper proposes an approach to modeling practical and efficient image filter in the 2D frequency domain. Instead of employing a circular-shaped filter, this study proposes a polygon-shaped filter inspired by the concept of a hexagon cellular system for frequency reuse in wireless communication systems. By employing the concept of frequency reuse, bandwidth efficiency is also achieved in the frequency domain. To substantiate the proposed approach, quantitative evaluation is performed using PSNR.

Gradual Certification Correspond with Sensual Confidence by Network Paths (본인인증의 네트워크 경로와 감성신뢰도에 연동한 점진적 인증방법)

  • Suh, Hyo-Joong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.12
    • /
    • pp.955-963
    • /
    • 2017
  • Nowadays, fintech becomes the key technology of the mobile banking and payments. Financial market is moved to fintech-based non-face-to-face trade/payment from traditional face-to-face process in Korea. Core of this transition is the smartphones, which have several sensitive sensors for personal identifications such as fingerprint and iris recognition sensors. But it has some originated security risks by data path attacks, for instance, hacking and pharming. Multi-level certification and security systems are applied to avoid these threats effectively, while these protections can be cause of some inconvenience for non-face-to-face certifications and financing processes. In this paper, I confirmed that it have sensible differences correspond with the data connection paths such as WiFi networks and mobile communication networks of the smartphones, and I propose a gradual certification method which alleviates the inconvenience by risk-level definitions of the data-paths.