• Title/Summary/Keyword: 위치추적시스템

Search Result 1,293, Processing Time 0.034 seconds

RFID Mutual Authentication Protocol Using Nonfixed Symmetric Key Based on Shift Computation and Random Number (시프트 연산과 난수를 이용한 가변적 대칭키 기반의 RFID 상호인증 프로토콜)

  • Lee, Jae-Kang;Oh, Se-Jin;Chung, Kyung-Ho;Lee, Chang-Hee;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.377-384
    • /
    • 2012
  • RFID system is a technique to obtain information of tag using radio frequency. Specificity of RFID systems using radio frequency has many problems that is eavesdropping, location tracking, spoofing attack, replay attack, denial of service attack. So, RFID protocol should be used cryptographic methods and mutual authentication for security and privacy. In this paper, we explain the problem of past protocol and propose the nonfixed symmetric key-based RFID mutual authentication protocol using shift computation and random number. Proposed protocol is secure from various attacks. Because it use shift operation and non-fixed symmetric key.

A study on of Stray Child Prevention App Using GPS and Bluetooth 'Kid Keeper' (GPS와 Bluetooth를 이용한 미아예방 '키드키퍼' 앱 개발 연구)

  • Kim, Sung Hwan;An, Guek Dong;Kim, Min Sub;Moon, Song Chul
    • Journal of Service Research and Studies
    • /
    • v.4 no.1
    • /
    • pp.61-70
    • /
    • 2014
  • We are being developed many applicaton of wireless mobile computing system environment with development of wireless internet technology and teminal eqipment. Lately, Modern Society increase terror of infant children and weak peoples. This study suggested missing child prevention and protection of infant children. When happened an emergency of missing child has risen, we suggest missing child prevention system. This system find position of missing child in fast time. We analysis and design and constructed missing child prevention system by bluetooth and GPS of wireless mobile environment.

  • PDF

Automated Coordinator between Testing and Debugging of Embedded Software (임베디드 소프트웨어를 위한 테스트와 디버깅 연계 자동화 방안)

  • Choi, Yoo-Na;Seo, Joo-Young;Choi, Byoung-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.5
    • /
    • pp.576-580
    • /
    • 2010
  • Generally, due to the strong coherence between embedded software and hardware or peripheral software, embedded software is tested by using black-box test based on user scenario for the whole system. This paper suggests the method to coordinate between testing and debugging under consideration for difficulties on solving out the defects detected from black-box test. First of all, from test result analysis, it builds up the debugging strategies enable to trace the locations of the defect's causes. And along with the strategies, it implements the generator of test scripts to be performed on the emulator environment. Through these steps, it can coordinate embedded software testing and debugging activities.

Localization of Human Motion Using a 8×8 Phased Array Antenna (8×8 위상배열안테나를 이용한 위치추적 시스템)

  • Goh, Hoseok;Han, Heeje;Park, Soonwoo;Kim, Chan-woo;Kim, Hongjoon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.9
    • /
    • pp.1197-1201
    • /
    • 2018
  • In this paper, a Doppler radar for a localization of a human motion is demonstrated. In the system, we used a $8{\times}8$ phased array antenna using metamaterial phase shifters for easy and precise control of antenna beam pattern. Scanning area is a circular sector with an inscribed angle of $60^{\circ}$ and a diameter of 45m. This area is divided with 15 designated area and each area is scanned for 0.2 second. When there is a motion in a designated area, we are able to detect a frequency shift due to a Doppler effect. In this way it is possible to detect the location of motion. The experiment shows that 78% of position accuracy. The remaining 22% occurred the surroundings of the designated area.

A Study on Data Storage and Recovery in Hadoop Environment (하둡 환경에 적합한 데이터 저장 및 복원 기법에 관한 연구)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.569-576
    • /
    • 2013
  • Cloud computing has been receiving increasing attention recently. Despite this attention, security is the main problem that still needs to be addressed for cloud computing. In general, a cloud computing environment protects data by using distributed servers for data storage. When the amount of data is too high, however, different pieces of a secret key (if used) may be divided among hundreds of distributed servers. Thus, the management of a distributed server may be very difficult simply in terms of its authentication, encryption, and decryption processes, which incur vast overheads. In this paper, we proposed a efficiently data storage and recovery scheme using XOR and RAID in Hadoop environment.

Time delay estimation by iterative Wiener filter based recursive total least squares algorithm (반복형 위너 필터 방법에 기반한 재귀적 완전 최소 제곱 방법을 사용한 시간 지연 추정 알고리즘)

  • Lim, Jun-Seok
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.5
    • /
    • pp.452-459
    • /
    • 2021
  • Estimating the mutual time delay between two acoustic sensors is used in various fields such as tracking and estimating the location of a target in room acoustics and sonar. In the time delay estimation methods, there are a non-parametric method, such as Generalized Cross Correlation (GCC), and a parametric method based on system identification. In this paper, we propose a time delay estimation method based on the parametric method. In particular, we propose a method that considers the noise in each receiving acoustic sensor. Simulation confirms that the proposed algorithm is superior to the existing generalized cross-correlation and adaptive eigenvalue analysis methods in white noise and reverberation environments.

Design and Implementation of Store Order Applications Based on Kinect Sensor (키넥트 센서 기반의 매장 주문 어플리케이션 설계 및 구현)

  • Lee, Won Joo;Oh, hyun su;Im, ji seop;Hwang, Sam mi;Kim, min su
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.109-110
    • /
    • 2019
  • 본 논문에서는 Kinect sensor의 음성 인식 기능을 활용한 매장 주문 어플리케이션을 설계하고 구현한다. 노년층과 유아들은 무인주문결제시스템의 터치스크린 조작 및 사용자 인터페이스에 익숙하지 않기 때문에 매장에서 상품을 주문하고 결제하는데 불편함을 경험하고 있다. 이러한 불편함을 제거하기 위한 하나의 방법으로 키넥트 센서의 음성 인식 기능을 이용하여 음성으로 쉽게 주문을 할 수 있는 매장 주문 어플리케이션을 개발한다. Kinect에는 4개의 오디오 마이크로폰이 있어서 $-50^{\circ}{\sim}50^{\circ}$ 범위의 음성을 인식할 수 있으며 20db 이하의 주위 소음은 무시한다. 이 범위내에서 $10^{\circ}$씩 증가시키면서 음원의 위치를 추적한다.

  • PDF

Position Tracking System Based on UWB and MEMS IMU (UWB 및 MEMS IMU 복합 센서 기반의 위치 추적 시스템)

  • Kwon, Seong-Geun
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.9
    • /
    • pp.1011-1019
    • /
    • 2019
  • In this paper, we propose a system that can more precisely identify and monitor the position of the tool used in the assembling workplace such as automobile production. The proposed positioning monitoring system is a combination of UWB communication module and MEMS IMU sensor. Since UWB does not need modulation and demodulation function and has low power density, UWB is widely used in indoor positioning field. However, it may cause positioning error due to errors in RF transmission and reception process, which may cause positioning accuracy. Therefore, in this paper, we propose an algorithm that uses IMU as an auxiliary means to compensate for errors that may occur in positioning using only UWB. The tag and anchor of UWB module measure the transmission / reception time by transmitting signals to each other and then estimate the distance between tag and anchor. The MEMS IMU sensor serves to provide positioning calibration information. The tag, which is a mobile node and attached to a moving tool, measures the three-dimensional position of the tool and transfers the coordinate data to the anchor. Thus, it is possible to confirm whether or not the specific tool is properly used according to the prescribed regulations.

Easy to Search for Tags on Database and Secure Mutual Authentication Protocol for RFID system (데이터베이스에서의 태그 검색이 쉽고 안전한 RFID 상호인증 프로토콜)

  • Kwon, Hye-Jin;Lee, Jae-Wook;Jeon, Dong-Ho;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.125-134
    • /
    • 2008
  • A great number of RFID authentication protocols have been proposed for the secure RFID system. These are typically divided into three types according to primitive that they use : Hash-based, Re-encryption based, and XORing-based protocol. The well-known attacks in RFID system are eavesdropping. impersonating, location tracking, and so on. However, existing protocols could not provide security against above attacks, or it was not efficient to search for tags on database. Therefore, in this paper we present a protocol which is secure against above attacks by using hash function and makes Database search tags easily by attaining the state information of previous session through the shared values with all tags and database.

Development of a Self-Driving Service Robot for Monitoring Violations of Quarantine Rules (방역수칙 위반 감시를 위한 자율주행 서비스 로봇 개발)

  • Lee, In-kyu;Lee, Yun-jae;Cho, Young-jun;Kang, Jeong-seok;Lee, Don-gil;Yoo, Hong-seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.323-324
    • /
    • 2022
  • 본 논문에서는 사람의 개입 없이 실내 환경에서 마스크 미 착용자를 스스로 발견한 후 방역수칙위반 사실에 대한 경고와 함께 마스크 착용을 권고하는 인공지능 기반의 자율주행 서비스 로봇을 개발한다. 제안한 시스템에서 로봇은 동시적 위치 추적 지도 작성 기법인 SLAM(Simultaneous Localization and Mapping)기술을 이용하여 지도를 작성한 후 사용자가 제공한 웨이포인트(Waypoint)를 기반으로 자율주행한다. 또한, YOLO(You Only Look Once) 알고리즘을 이용한 실시간 객체 인식 기술을 활용하여 보행자의 마스크 착용 여부를 판단한다. 실험을 통해 사전에 작성된 지도에 지정된 웨이포인트를 따라 로봇이 자율주행하는 것을 확인하였다. 또한, 충전소로 이동할 경우, 영상 처리 기법을 활용하여 충전소에 부착된 표식에 근접하도록 이동하여 충전이 진행됨을 확인하였다.

  • PDF