• 제목/요약/키워드: Application identification

검색결과 1,601건 처리시간 0.029초

RFID의 프로토콜 및 인터페이스 파라미터 (Data Protocol and Air Interface Communication Parameters for Radio Frequency Identification)

  • 최성운
    • 대한안전경영과학회:학술대회논문집
    • /
    • 대한안전경영과학회 2007년도 추계학술대회
    • /
    • pp.323-328
    • /
    • 2007
  • This paper introduces radio frequency identification(RFID) information technologies for item management such as application interface of data protocol, data encoding rules and logical memory functions for data protocol, and, unique identification for RF tags. This study presents reference architecture and definition of parameters to be standardized, various parameters for air intreface communications, and, application requirements profiles.

  • PDF

EA 온톨로지 기반 비즈니스 서비스 자동 식별방안 (Automatic Identification of Business Services Using EA Ontology)

  • 정찬기;황상규
    • 한국IT서비스학회지
    • /
    • 제9권3호
    • /
    • pp.179-191
    • /
    • 2010
  • Service identification and composition is one of the key characteristics for a successful Service-Oriented Computing, being receiving a lot of attention from researchers in recent years. In the Service-Oriented Analysis, the identification of business services has to be preceded before application services are identified. Most approaches addressing the derivation of business services are based on heuristic methods and human experts. The manual identification of business services is highly expensive and ambiguous task, and it may result in the service design with bad quality because of errors and misconception. Although a few of approaches of automatic service identification are proposed, most of them are in focus on technical architectures and application services. In this paper, we propose a model on the automatic identification of business services by horizontal and vertical service alignment using Enterprise Architecture as an ontology. We verify the effectiveness of the proposed model of business services identification through a case study based on Department of Defense Enterprise Architecture.

An Experimental Application of Observer/controller Identification Algorithm to the System Identification of Inherently Unstable Systems

  • Park, Mun-Soo;Yang, Dong-Hoon;Hong, Suk-Kyo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2002년도 ICCAS
    • /
    • pp.63.4-63
    • /
    • 2002
  • $\textbullet$ Closed System Identification for inherently unstable systems $\textbullet$ Application of Observer/controller Identification (OCID) algorithm to those systems $\textbullet$ An open-loop system model with corresponding controller and observer gains are identified using OCID $\textbullet$ Experimental example of the OCID algorithm for an inverted pendulum system operating in closed-loop $\textbullet$ Modal analysis and time response to the added distrubance are presented to evaluate the performance of the OCID algorithm.

  • PDF

Visible Light Identification System for Smart Door Lock Application with Small Area Outdoor Interface

  • Song, Seok-Jeong;Nam, Hyoungsik
    • Current Optics and Photonics
    • /
    • 제1권2호
    • /
    • pp.90-94
    • /
    • 2017
  • Visible light identification (VLID) is a user identification system for a door lock application using smartphone that adopts visible light communication (VLC) technology with the objective of high security, small form factor, and cost effectiveness. The user is verified by the identification application program of a smartphone via fingerprint recognition or password entry. If the authentication succeeds, the corresponding encoded visible light signals are transmitted by a light emitting diode (LED) camera flash. Then, only a small size and low cost photodiode as an outdoor interface converts the light signal to the digital data along with a comparator, and runs the authentication process, and releases the lock. VLID can utilize powerful state-of-the-art hardware and software of smartphones. Furthermore, the door lock system is allowed to be easily upgraded with advanced technologies without its modification and replacement. It can be upgraded by just update the software of smartphone application or replacing the smartphone with the latest one. Additionally, wireless connection between a smartphone and a smart home hub is established automatically via Bluetooth for updating the password and controlling the home devices. In this paper, we demonstrate a prototype VLID door lock system that is built up with LEGO blocks, a photodiode, a comparator circuit, Bluetooth module, and FPGA board.

Application-Level Traffic Monitoring and an Analysis on IP Networks

  • Kim, Myung-Sup;Won, Young-J.;Hong, James Won-Ki
    • ETRI Journal
    • /
    • 제27권1호
    • /
    • pp.22-42
    • /
    • 2005
  • Traditional traffic identification methods based on wellknown port numbers are not appropriate for the identification of new types of Internet applications. This paper proposes a new method to identify current Internet traffic, which is a preliminary but essential step toward traffic characterization. We categorized most current network-based applications into several classes according to their traffic patterns. Then, using this categorization, we developed a flow grouping method that determines the application name of traffic flows. We have incorporated our method into NG-MON, a traffic analysis system, to analyze Internet traffic between our enterprise network and the Internet, and characterized all the traffic according to their application types.

플로우 상관관계를 통한 인터넷 응용 트래픽 분석의 성능 향상에 관한 연구 (A Study of Performance Improvement of Internet Application Traffic Identification using Flow Correlation)

  • 윤성호;김명섭
    • 한국통신학회논문지
    • /
    • 제36권6B호
    • /
    • pp.600-607
    • /
    • 2011
  • 인터넷의 대중화로 네트워크 트래픽은 지속적으로 증가하고 복잡해지고 있다. 따라서 네트워크 자원의 효율적인 사용을 위한 응용 트래픽 분석의 중요성은 더욱 강조되고 있다. 본 논문에서는 기존 시그니쳐 기반의 인터넷 트래픽 분석 방법의 한계점을 극복하고 분석 경과의 성능 향상(분석률)을 위해 플로우 상관관계를 이용한 트래픽 분석 방법을 제안한다. 본 논문에서 제안하는 방법은 시그니쳐 기반 분석기의 결과를 입력 받아 분석된 플로우와 그렇지 않은 플로우을 간의 상관관계를 파악하고 이를 통해 분석되지 않은 플로우를 분석한다. 총 4가지(서버-클라이언트 발생 시간, 호스트-호스트, 통계) 세부 분석 방법과 이를 통합한 플로우 상관관계 기반 분석기를 제안한다. 또한 실험과 검증을 통하여 플로우 상관관계 기반 응용 분석 방법의 타당성을 증명한다.

헤더 기반 인터넷 응용 트래픽 분석을 위한 시그니쳐 관리 방법에 관한 연구 (Research on Signature Maintenance Method for Internet Application Traffic Identification using Header Signatures)

  • 윤성호;김명섭
    • 인터넷정보학회논문지
    • /
    • 제12권6호
    • /
    • pp.19-33
    • /
    • 2011
  • 효율적인 네트워크 관리를 위한 응용 트래픽 분석의 중요성이 강조되고 있다. 헤더 기반 분석 방법론은 기존 분석 방법론의 한계점들분석 오버헤드, 페이로드 암호화 등)을 극복하기 위해 응용 트래픽의 헤더 정보를 시그니쳐로 추출{IP address, port number, transport layer protocol TCP/UDP)}하여 트래픽을 분석한다. 헤더 기반 트래픽 분석 방법론은 헤더 정보를 사용하기 때문에 많은 양의 시그니쳐가 추출된다. 따라서 최적의 시그니쳐를 유지할 수 있는 관리 방법이 필요하다. 본 논문에서는 시그니쳐로 분석된 트래픽의 특성과 시그니쳐의 분석이력을 이용하여 최적의 시그니쳐를 관리하는 방법론을 제안한다. 또한, 실험과 검증을 통하여 헤더 시그니쳐 관리 방법의 타당성을 증명한다.

RFID 군 적용방안 연구 (A Study on the Implementation of RFID for Korean Defense)

  • 이재열;김성원;최상영
    • 한국국방경영분석학회지
    • /
    • 제31권1호
    • /
    • pp.58-72
    • /
    • 2005
  • RFID(Radio Frequency Identification) is one of key technologies in ubiquitous computing. RFID system comprises tag, reader, and computer application. The tag is a small electronic chip, which is attached to a thing such as item, pallet, container. The reader has an tiny antenna obtaining the identification information of the things by radio frequency, and provides the information to the computer application for a business. In this paper we have proposed the military application of RFID and its implementation policy for the Korean armed forces. We believe that The principle application area would be logistics TAV(total asset visibility) and resource management, and the implementation should be achieved step by step considering the advancement of RFID technology and government policy.

Design of Tourism Application Based on RFID Technology

  • Lee, JiHyun;Lee, JoonGoo;Kim, SeonWook
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권2호
    • /
    • pp.74-82
    • /
    • 2014
  • Automatic identification is pervasive in many areas and its applicable areas are increasing gradually. 2D bar-code, NFC, and RFID technologies are representative examples of the automatic identification. This paper explains the implementation of mobile tourism application software on RFID technology. The mobile application provides the location and navigation information by combining the tag inventory and web database. The interactions among the user, application and database server are described in detail. This paper proposes a simple way of minimizing the efforts to build the entire system by storing the URLs for the tag and accessing existing tourism information services through the URLs.

변증 진단 체계 개발 및 응용 연구 분석 -한방 비만변증을 중심으로- (Analysis of Development and Application of Pattern Identification System -Based on Oriental Obesity Pattern Identification-)

  • 박정식;송윤경;황의형;정원석;박원형;차윤엽;신승우;박태용;장보형;김호준;고성규
    • 한방재활의학과학회지
    • /
    • 제24권2호
    • /
    • pp.107-114
    • /
    • 2014
  • Objectives The purpose of this study is analyzing internal research trends of oriental obesity pattern identification in korean literature based on obesity pattern identification questionnaires, development and application of Pattern Identification System to help solve problems of future researches. Methods 6 Korean databases were searched for articles of oriental obesity pattern identification, irrespective of publication year and 13 studies were reviewed. An analytical method such as descriptive statistics and an actual number and percentage was used. Results We collected 13 studies. 4 studies were published in 2012 and 2008, the highest number of studies. 7 Clinical studies were the major research method. The Studies were classified according to the characteristics and design. 5 studies were about research of analysis and improvement of oriental obesity pattern identification questionnaire, the most number of studies. 4 studies were about research of observational studies in clinical on obesity pattern identification. 3 studies were about research of intervention studies in clinical on obesity pattern identification and 1 study was about clinical practice recommendation. Conclusions Establishment of obesity pattern identification system and its clinical application could lead to standardizing obesity pattern identification and clinical practice guideline. Applied on other diseases, obesity pattern identification system could also lead to improving treatment rate, contributing to the development of clinical practice guidelines and academic field of research.