• Title/Summary/Keyword: EPCglobal network

Search Result 59, Processing Time 0.016 seconds

A Study on EPCIS System Modeling by Data Modeling Method (데이터 모델링 기법을 이용한 EPCIS 시스템의 모델링에 관한 연구)

  • Li, Zhong-Shi
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.2
    • /
    • pp.177-183
    • /
    • 2012
  • Obtaining and applying information is considered as a critical task in the modern informationized society. Finding the one's necessary information and processing it into a detailed knowledge are becoming more priortized in the enormous amount of information. Data modelling is the process that does not only reflect the demands of the user but the one that also facilitates the user's comprehension of the model itself. Ultimately, data modelling fully supports the processes that are requisite for the implementation of a data base and minimizes the alternations of the model during the development of applications.

A Study on Data Modeling for VLDB Performance (VLDB의 성능을 고려한 데이터 모델링에 관한 연구)

  • Li, Zhong-Shi;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.2
    • /
    • pp.185-192
    • /
    • 2012
  • It has been a huge amount of capacity of 10GB data base in a decade ago so far. Nowadays, however, 10TB is the common data base and even bigger capacities are available. So, new generation of Very Large Data Base (VLDB) has begun. Moving in to the new generation of VLDB has been caused major problems like backing up, restoring, and managing especially performance. It is very hard to export necessary data rapidly now due to the huge amount of data base. In the past, such kind of problems was out of the questions because of less data. As time goes on, however, optimization of performance became a big issue when the VLDB is common. Therefore, new professional technics are urgently required to maintain and optimize the data base that has become a VLDB or one that is in the progress of becoming one.

A Study on Efficiency of the EPCIS using Altibase DBMS (Altibase DBMS를 활용한 EPCIS 효율화 방안 연구)

  • Piao, Xue-Hua;Lee, Doo-Yong;Song, Young-Keun;Kwon, Dae-Woo;Jho, Yong-Chul;Lee, Chang-Ho
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2010.04a
    • /
    • pp.167-172
    • /
    • 2010
  • EPCIS(EPC Information Service)시스템은 EPC기반의 정보교환을 목표로 EPC global Network 상에서 RFID 태그에 기록된 화물의 EPC데이터, 인식시점, 인식장소 등의 정보를 제공하는 EPCglobal Architecture Framework의 구성요소 중 핵심부분이라고 할 수 있다. 본 논문에서는 EPCIS 시스템의 구성요소 중 동시에 수많은 RFID 단말기로부터 입력되는 대용량의 EPCIS Event 데이터를 지속적으로 저장하고 관리하는 EPCIS Repository를 효율적으로 관리하기 위하여 고성능이 필요한 데이터와 대용량이 필요한 데이터를 모두 처리할 수 있는 Hybrid DBMS를 적용하여 EPCIS Repository를 효율적으로 관리할 수 있는 방안을 제시하고자 한다.

  • PDF

A Study on Analyzing the Effects and Verification of EPCIS by Influences of Shema (스키마 변화에 따른 EPCIS의 효과 분석 및 검증에 관한 연구)

  • Li, Zhong-Shi
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.1
    • /
    • pp.209-216
    • /
    • 2013
  • RFID/USN, are recognized as the new growth engines for the future, regardless of the advanced and developing countries. RFID, in particular, already entered practical stage by global companies. EPCIS, which is the one of the EPC golabal network components, makes a huge load on the system due to the large amount of entering data by following events. In this study, a data model developed based on ER-WIN by collecting four kind information that occurred in the EPC global networks. This model supports both in processing of high performance and huge capacity of data by a considerable storage capacity and input speed. A simulation was developed in order to verify the performance. Each model tested several times and results were compared.

Trends of Middlewares for Processing the RFID -Based Sensor Data on the Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 RFID 기반 센서 데이터 처리 미들웨어 기술 동향)

  • Won, J.H.;Lee, M.J.;Kim, M.J.
    • Electronics and Telecommunications Trends
    • /
    • v.19 no.5 s.89
    • /
    • pp.21-30
    • /
    • 2004
  • 마크와이저에 의하여 제창된 유비쿼터스 컴퓨팅을 가능하게 하는 차세대 핵심 기술로 RFID 기술이 주목받고 있으며, RFID를 기반으로 하는 유비쿼터스 컴퓨팅 환경에서 응용 서비스를 제공하기 위하여 다양한각도에서 연구 개발이 진행되고 있다. 본 고에서는 RFID를 기반으로 하는 유비쿼터스 컴퓨팅 환경을 구현하기 위한 EPCglobal의 EPC Network Architecture의 구성 요소에 대하여 알아보고 이를 지원하는 미들웨어 제품 및 솔루션을 살펴보고, 연속적으로 들어오는 데이터 스트림을 실시간으로 처리하기 위해 수행되고 있는 프로젝트들의 기술 동향에 대하여 논의한다.

Framework for Supporting Business Services based on the EPC Network (EPC Network 기반의 비즈니스 서비스 지원을 위한 프레임워크)

  • Nam, Tae-Woo;Yeom, Keun-Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.17D no.3
    • /
    • pp.193-202
    • /
    • 2010
  • Recently, there have been several researches on automatic object identification and distributed computing technology to realize a ubiquitous computing environment. Radio Frequency IDentification (RFID) technology has been applied to many business areas to simplify complex processes and gain important benefits. To derive real benefits from RFID, the system must rapidly implement functions to process a large quantity of event data generated by the RFID operations and should be configured dynamically for changing businesses. Consequently, developers are forced to implement systems to derive meaningful high-level events from simple RFID events and bind them to various business processes. Although applications could directly consume and act on RFID events, extracting the business rules from the business logic leads to better decoupling of the system, which consequentially increases maintainability. In this paper, we describe an RFID business aware framework for business processes in the Electronic Product Code (EPC) Network. This framework is proposed for developing business applications using business services. The term "business services" refers to generated events that can be used in business applications without additional data collection and processing. The framework provides business rules related to data collection, processing, and management, and supports the rapid development and easy maintenance of business applications based on business services.

Distributed Continuous Query Processing Scheme for RFID Data Stream (RFID 데이터 스트림에 대한 분산 연속질의 처리 기법)

  • Ahn, Sung-Woo;Hong, Bong-Hee;Jung, Dong-Gyu
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.1-12
    • /
    • 2009
  • An RFID application needs to collect product's information scattered over the RFID network efficiently according to the globalization of RFID applied enterprises. To be informed of the stock status of products promptly in the supply chain network, especially, it is necessary to support queries that retrieve statistical information of tagged products. Since existing RFID network does not provide these kinds of queries, however, an application should request a query to several RFID middleware systems and analyze collected data directly. This process makes an application do a heavy computation for retrieving statistical information. To solve this problem, we define a new Distributed Continuous Query that finds information of tagged products from the global RFID network and provides statistical information to RFID applications. We also propose a Distributed Continuous Query System to process the distributed continuous query efficiently. To find out the movement of products via multiple RFID systems in real time, our proposed system uses Pedigree which represents trade information of items. Our system can also reduce the cost of query processing for removing duplicated data from multiple middleware systems by using Pedigree.

Security Framework for RFID-based Applications in Smart Home Environment

  • Konidala, Divyan M.;Kim, Dae-Young;Yeun, Chan-Yeob;Lee, Byoung-Cheon
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.111-120
    • /
    • 2011
  • The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers. There has also been much talk of a very popular RFID application: a refrigerator/bookshelf that can scan and list out the details of its items on its display screen. Realizing such an application is not as straight forward as it seems to be, especially in securely deploying such RFID-based applications in a smart home environment. Therefore this paper describes some of the RFID-based applications that are applicable to smart home environments. We then identify their related privacy and security threats and security requirements and also propose a secure approach, where RFID-tagged consumer items, RFID-reader enabled appliances (e.g., refrigerators), and RFID-based applications would securely interact among one another. At the moment our approach is just a conceptual idea, but it sheds light on very important security issues related to RFID-based applications that are beneficial for consumers.

A Study on the Improved Method for Mutual Suppression between of RFID is expected System and Algorithm (무선인식 시스템(RFID)에 적합한 알고리즘 분석 및 전파특성에 관한 연구)

  • Kang, Jeong-Yong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.3
    • /
    • pp.23-30
    • /
    • 2007
  • RFID it reads information which is it writes, the semiconductor chip for and the radio frequency system which uses the hazard antenna it has built-in transmission of information it talks. Formation which is transmitted like this collection and America which it filtrates wey the RFID search service back to inform the location of the server which has commodity information which relates with an object past record server. The hazard where measurement analysis result the leader for electronic interference does not occur consequently together from with verification test the power level which is received from the antenna grade where it stands must maintain minimum -55dBm and the electronic interference will not occur with the fact that, antenna and reel his recognition distance the maximum 7m until the recognition which is possible but smooth hazard it must stand and and with the fact that it will do from within and and and 3-4m it must be used Jig it is thought.