• Title/Summary/Keyword: Application identification

Search Result 1,591, Processing Time 0.027 seconds

Data Protocol and Air Interface Communication Parameters for Radio Frequency Identification (RFID의 프로토콜 및 인터페이스 파라미터)

  • Choi, Sung-Woon
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.11a
    • /
    • pp.323-328
    • /
    • 2007
  • This paper introduces radio frequency identification(RFID) information technologies for item management such as application interface of data protocol, data encoding rules and logical memory functions for data protocol, and, unique identification for RF tags. This study presents reference architecture and definition of parameters to be standardized, various parameters for air intreface communications, and, application requirements profiles.

  • PDF

Automatic Identification of Business Services Using EA Ontology (EA 온톨로지 기반 비즈니스 서비스 자동 식별방안)

  • Jeong, Chan-Ki;Hwang, Sang-Kyu
    • Journal of Information Technology Services
    • /
    • v.9 no.3
    • /
    • pp.179-191
    • /
    • 2010
  • Service identification and composition is one of the key characteristics for a successful Service-Oriented Computing, being receiving a lot of attention from researchers in recent years. In the Service-Oriented Analysis, the identification of business services has to be preceded before application services are identified. Most approaches addressing the derivation of business services are based on heuristic methods and human experts. The manual identification of business services is highly expensive and ambiguous task, and it may result in the service design with bad quality because of errors and misconception. Although a few of approaches of automatic service identification are proposed, most of them are in focus on technical architectures and application services. In this paper, we propose a model on the automatic identification of business services by horizontal and vertical service alignment using Enterprise Architecture as an ontology. We verify the effectiveness of the proposed model of business services identification through a case study based on Department of Defense Enterprise Architecture.

An Experimental Application of Observer/controller Identification Algorithm to the System Identification of Inherently Unstable Systems

  • Park, Mun-Soo;Yang, Dong-Hoon;Hong, Suk-Kyo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.63.4-63
    • /
    • 2002
  • $\textbullet$ Closed System Identification for inherently unstable systems $\textbullet$ Application of Observer/controller Identification (OCID) algorithm to those systems $\textbullet$ An open-loop system model with corresponding controller and observer gains are identified using OCID $\textbullet$ Experimental example of the OCID algorithm for an inverted pendulum system operating in closed-loop $\textbullet$ Modal analysis and time response to the added distrubance are presented to evaluate the performance of the OCID algorithm.

  • PDF

Visible Light Identification System for Smart Door Lock Application with Small Area Outdoor Interface

  • Song, Seok-Jeong;Nam, Hyoungsik
    • Current Optics and Photonics
    • /
    • v.1 no.2
    • /
    • pp.90-94
    • /
    • 2017
  • Visible light identification (VLID) is a user identification system for a door lock application using smartphone that adopts visible light communication (VLC) technology with the objective of high security, small form factor, and cost effectiveness. The user is verified by the identification application program of a smartphone via fingerprint recognition or password entry. If the authentication succeeds, the corresponding encoded visible light signals are transmitted by a light emitting diode (LED) camera flash. Then, only a small size and low cost photodiode as an outdoor interface converts the light signal to the digital data along with a comparator, and runs the authentication process, and releases the lock. VLID can utilize powerful state-of-the-art hardware and software of smartphones. Furthermore, the door lock system is allowed to be easily upgraded with advanced technologies without its modification and replacement. It can be upgraded by just update the software of smartphone application or replacing the smartphone with the latest one. Additionally, wireless connection between a smartphone and a smart home hub is established automatically via Bluetooth for updating the password and controlling the home devices. In this paper, we demonstrate a prototype VLID door lock system that is built up with LEGO blocks, a photodiode, a comparator circuit, Bluetooth module, and FPGA board.

Application-Level Traffic Monitoring and an Analysis on IP Networks

  • Kim, Myung-Sup;Won, Young-J.;Hong, James Won-Ki
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.22-42
    • /
    • 2005
  • Traditional traffic identification methods based on wellknown port numbers are not appropriate for the identification of new types of Internet applications. This paper proposes a new method to identify current Internet traffic, which is a preliminary but essential step toward traffic characterization. We categorized most current network-based applications into several classes according to their traffic patterns. Then, using this categorization, we developed a flow grouping method that determines the application name of traffic flows. We have incorporated our method into NG-MON, a traffic analysis system, to analyze Internet traffic between our enterprise network and the Internet, and characterized all the traffic according to their application types.

A Study of Performance Improvement of Internet Application Traffic Identification using Flow Correlation (플로우 상관관계를 통한 인터넷 응용 트래픽 분석의 성능 향상에 관한 연구)

  • Yoon, Sung-Ho;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.600-607
    • /
    • 2011
  • As network traffic is dramatically increasing due to the popularization of Internet, the need for application traffic identification becomes important for the effective use of network resources. In this paper, we present an Internet application traffic identification method based on flow correlation to overcome limitation of signature-based identification methods and to improve performance (completeness) of it. The proposed method can identify unidentified flows from signature-based method using flow correlation between identified and unidentified flows. We propose four separate correlation methods such as Server-Client, Time, Host-Host, and Statistic correlation and describe a flow correlation-based identification system architecture which incorporates the four separate methods. Also we prove the feasibility and applicability of our proposed method by an acceptable experimental result.

Research on Signature Maintenance Method for Internet Application Traffic Identification using Header Signatures (헤더 기반 인터넷 응용 트래픽 분석을 위한 시그니쳐 관리 방법에 관한 연구)

  • Yoon, Sung-Ho;Kim, Myung-Sup
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.19-33
    • /
    • 2011
  • The need for application traffic classification becomes important for the effective use of network resources. The header-based identification method uses the header signature {IP address, port number, transport layer protocol TCP/UDP)}extracted from Internet application server to overcome some limitations overhead, payload encryption, etc.) of previous methods. A lots signature is extracted because this method uses header information of server. So, we need a maintenance method to keep essential signatures. In this paper, we represent the signature maintenance method using properties of identified traffic and history of the signature. Also, we prove the feasibility and applicability of our proposed method by an acceptable experimental result.

A Study on the Implementation of RFID for Korean Defense (RFID 군 적용방안 연구)

  • Lee, Jea-Youl;Kim, Seong-Won;Choi, Sang-Young
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.1
    • /
    • pp.58-72
    • /
    • 2005
  • RFID(Radio Frequency Identification) is one of key technologies in ubiquitous computing. RFID system comprises tag, reader, and computer application. The tag is a small electronic chip, which is attached to a thing such as item, pallet, container. The reader has an tiny antenna obtaining the identification information of the things by radio frequency, and provides the information to the computer application for a business. In this paper we have proposed the military application of RFID and its implementation policy for the Korean armed forces. We believe that The principle application area would be logistics TAV(total asset visibility) and resource management, and the implementation should be achieved step by step considering the advancement of RFID technology and government policy.

Design of Tourism Application Based on RFID Technology

  • Lee, JiHyun;Lee, JoonGoo;Kim, SeonWook
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.2
    • /
    • pp.74-82
    • /
    • 2014
  • Automatic identification is pervasive in many areas and its applicable areas are increasing gradually. 2D bar-code, NFC, and RFID technologies are representative examples of the automatic identification. This paper explains the implementation of mobile tourism application software on RFID technology. The mobile application provides the location and navigation information by combining the tag inventory and web database. The interactions among the user, application and database server are described in detail. This paper proposes a simple way of minimizing the efforts to build the entire system by storing the URLs for the tag and accessing existing tourism information services through the URLs.

Analysis of Development and Application of Pattern Identification System -Based on Oriental Obesity Pattern Identification- (변증 진단 체계 개발 및 응용 연구 분석 -한방 비만변증을 중심으로-)

  • Park, Jung-Sik;Song, Yun-Kyung;Hwang, Eui-Hyoung;Chung, Won-Suk;Park, Won-Hyung;Cha, Yun-Yeop;Shin, Seung-Woo;Park, Tae-Yong;Jang, Bo-Hyoung;Kim, Ho-Jun;Ko, Seong-Gyu
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.24 no.2
    • /
    • pp.107-114
    • /
    • 2014
  • Objectives The purpose of this study is analyzing internal research trends of oriental obesity pattern identification in korean literature based on obesity pattern identification questionnaires, development and application of Pattern Identification System to help solve problems of future researches. Methods 6 Korean databases were searched for articles of oriental obesity pattern identification, irrespective of publication year and 13 studies were reviewed. An analytical method such as descriptive statistics and an actual number and percentage was used. Results We collected 13 studies. 4 studies were published in 2012 and 2008, the highest number of studies. 7 Clinical studies were the major research method. The Studies were classified according to the characteristics and design. 5 studies were about research of analysis and improvement of oriental obesity pattern identification questionnaire, the most number of studies. 4 studies were about research of observational studies in clinical on obesity pattern identification. 3 studies were about research of intervention studies in clinical on obesity pattern identification and 1 study was about clinical practice recommendation. Conclusions Establishment of obesity pattern identification system and its clinical application could lead to standardizing obesity pattern identification and clinical practice guideline. Applied on other diseases, obesity pattern identification system could also lead to improving treatment rate, contributing to the development of clinical practice guidelines and academic field of research.