• Title/Summary/Keyword: ID4

Search Result 764, Processing Time 0.028 seconds

A Novel Carrier Leakage Suppression Scheme for UHF RFID Reader (UHF 대역 RFID 리더 반송파 누설 억압 연구)

  • Jung, Jae-Young;Park, Chan-Won;Yeom, Kyung-Whan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.4
    • /
    • pp.489-499
    • /
    • 2011
  • RFID technologies, which allow collecting, storing, processing, and tracking information by wirelessly recognizing the inherent ID of object through an attached electronic tag, have a variety of application areas. This paper presents a novel carrier leakage suppression RF(CLS-RF) front-end for ultra-high-frequency RF identification reader. The proposed reader CLS-RF front-end structure generates the carrier leakage replica through the nonlinear path that contains limiter. The limiting function only preserves the frequency and phase information of the leakage signal and rejects the amplitude modulated tag signal in the envelope. The carrier leakage replica is then injected into the linear path that contains phase shifter. Therefore, the carrier leakage signal is effectively cancelled out, while not affecting the gain of the desired tag backscattering signal. We experimentally confirm that the prototype shows a significant improvement in the leakage to signal ratio by up to 36 dB in 910 MHz, which is consistent with our simulation results.

A Study on the Cyber Education Center for Asynchronous Distance Education (비동기 원격교육을 위한 사이버 종합교육센터에 관한 연구)

  • 정재영;김석수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.4
    • /
    • pp.120-125
    • /
    • 1999
  • This paper is a study on the cyber education center, OpenEdu, developing on internet. The conventional cyber university is allowed for ID user only, but OpenEdu is opened all internet user for open education and it has a various content. free of charge and high quality. Also. in this system, we support the various 500 contents, other efficiently services and it is a self-learning(asynchronous) distance education application(HTML, PDF. Front Page) on cyber-space using the information super highway It will make the cyber education center from new paradigm of distance education. The purpose of OPenEdu provides a async. distance education service, free of charge to obtain many various contents on internet. The future study is enhanced user interface and upgraded content quality.

  • PDF

Robustness Evaluation of Image Watermarking mixed Key and Logo Scheme (키와 로고 방식을 혼합한 이미지 워터마킹의 강인성 평가)

  • Park, Young;Kim, Yoon-Ho;Choi, Se-Ha;Lee, Myong-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.598-601
    • /
    • 2002
  • In this research, robustness of image watermarking mixed Key and Logo scheme was evaluated. A personal ID of a copyrighter was key and watermark was logo image. The standard images of Baboon, Cameraman and Lena were used for experimental images, binary image‘Park’of 32$\times$32 and 64$\times$64 size were used for the watermark image, respectively. for robustness evaluation of the watermark, reconstructive rates of the watermark were obtained from images inserted watermark with image transformation or JPEG lossy compression. The experimental results show that the reconstructive rates of the case of 32$\times$32 watermark was better than the case of the 64$\times$64 watermark; average 5.9%, 13.9%, 6.5%, and 4.2% in the case of scale-down rates, rotational rates, impulse noise power density, and JPEG lossy compression rates, respectively.

  • PDF

Blockchain-Based Access Control Audit System for Next Generation Learning Management (차세대학습관리를 위한 블록체인 기반의 접근제어 감사시스템)

  • Chun, Ji Young;Noh, Geontae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.351-356
    • /
    • 2020
  • With the spread of COVID-19 infections, the need for next-generation learning management system for undact education is rapidly increasing, and the Ministry of Education is planning future education through the establishment of fourth-generation NEIS. If the fourth-generation NEIS System is well utilized, there are advantages such as providing personalized education services and activating the use of educational data, but a solution to the illegal access problem in an access control environment where strict authorization is difficult due to various user rights. In this paper, we propose a blockchain-based access control audit system for next-generation learning management. Sensitive personal information is encrypted and stored using the proposed system, and when the auditor performs an audit later, a secret key for decryption is issued to ensure auditing. In addition, in order to prevent modification and deletion of stored log information, log information was stored in the blockchain to ensure stability. In this paper, a hierarchical ID-based encryption and a private blockchain are used so that higher-level institutions such as the Ministry of Education can hierarchically manage the access rights of each institution.

Development of Hybrid Spatial Information Model for National Base Map (국가기본도용 Hybrid 공간정보 모델 개발)

  • Hwang, Jin Sang;Yun, Hong Sik;Yoo, Jae Yong;Cho, Seong Hwan;Kang, Seong Chan
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.32 no.4_1
    • /
    • pp.335-341
    • /
    • 2014
  • The main goal of this study is on developing a proper brand-new data of national base map and Data Based(DB) model for new information technology environments. To achieve this goal, we generated a brand-new Hybrid spatial information model which is specialized in the spatio-temporal map structure, the framework map for information integration, and the multiple-layered topology structure. The DB structure was designed to reflect the change of objections by adding a new dimension of 'time' in the spartial information, while the infrastructure was able to connect/converge with other information by giving the unique ID and multi-scale fusion map structure. Furthermore, the topology and multi visualization structure, including indoor and basement information, were designed to overcome limitations of expressing in 2 dimension map. The result from the performance test, which was based on the Hybrid spatial information model, confirms the possibility in advanced national base map and conducted DB model through implementing various information and spatiotemporal connections.

Indoor Navigation System for Visually Impaired Persons Using Camera and Range Sensors (카메라와 거리센서를 이용한 시각장애인 실내 보행안내 시스템)

  • Lee, Jin-Hee;Shin, Byeong-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.4
    • /
    • pp.517-528
    • /
    • 2011
  • In this paper, we propose an indoor navigation system that can do walk safely to the destination for visually impaired persons. The proposed system analyzes images taken with the camera finds the ID of the marker to identify the absolute position of the pedestrian. Using the distance and angle obtained from IMU(Inertial Measurement Unit) accelerometer sensor and a gyro sensor, the system decides the relative position of a pedestrian for the previous position to determine the next direction. At the same time, we simplify a complex spatial structure in front of user by means of ultrasonic sensors and determine an avoidance direction by estimating the patterns. Then, it uses a few IR(Infrared Rays) sensors to detect stair. Our system offers position of visually impaired persons incorporating multiple sensors and helps users to arrive to destination safely.

RFID System with 125KHz Using EM4095 (EM4095를 이용한 125KHz 무선인식 시스템)

  • Shin, Tae-Kyu;Jo, Heung-Kuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.91-94
    • /
    • 2009
  • RFID is application field is very wide. For example, There is parking administration system, bookkeeper administration system etc. Such application system must do priority Carrier wave choice according to application purpose. If in case of Carrier frequency is low, awareness distance is short and Carrier frequency is high, awareness distance is very long. This uses in case awareness object is fast-moving. And it must be Tag's supply and demand's that is smooth. Even if development of system is completed, if Tag's purchase is difficult, developing item is not need. In this paper, we shows RFID system using EM4095 chip that is using 125KHz by carrier wave. EM4095 is high effectiveness chip of the low-power and circuit is very simple. It is possible to read with being write as that connect 4 lines with MCU. MCU used Atmega128. As result, we explained circuit and control programs for each part, and show Tag's ID reception that use Reader by picture.

  • PDF

BIM-Based Generation of Free-form Building Panelization Model (BIM 기반 비정형 건축물 패널화 모델 생성 방법에 관한 연구)

  • Kim, Yang-Gil;Lee, Yun-Gu;Ham, Nam-Hyuk;Kim, Jae-Jun
    • Journal of KIBIM
    • /
    • v.12 no.4
    • /
    • pp.19-31
    • /
    • 2022
  • With the development of 3D-based CAD (Computer Aided Design), attempts at freeform building design have expanded to small and medium-sized buildings in Korea. However, a standardized system for continuous utilization of shape data and BIM conversion process implemented with 3D-based NURBS is still immature. Without accurate review and management throughout the Freeform building project, interference between members occurs and the cost of the project increases. This is very detrimental to the project. To solve this problem, we proposed a continuous utilization process of 3D shape information based on BIM parameters. Our process includes algorithms such as Auto Split, Panel Optimization, Excel extraction based on shape information, BIM modeling through Adaptive Component, and BIM model utilization method using ID Code. The optimal cutting reference point was calculated and the optimal material specification was derived using the Panel Optimization algorithm. With the Adaptive Component design methodology, a BIM model conforming to the standard cross-section details and specifications was uniformly established. The automatic BIM conversion algorithm of shape data through Excel extraction created a BIM model without omission of data based on the optimized panel cutting reference point and cutting line. Finally, we analyzed how to use the BIM model built for automatic conversion. As a result of the analysis, in addition to the BIM utilization plan in the general construction stage such as visualization, interference review, quantity calculation, and construction simulation, an individual management plan for the unit panel was derived through ID data input. This study suggested an improvement process by linking the existing research on atypical panel optimization and the study of parameter-based BIM information management method. And it showed that it can solve the problems of existing Freeform building project.

Secret Sharing based Node Authentication in FANET (FANET에서의 비밀분산 기반 노드 인증)

  • Yang Ji Hun;Lee Soo Jin
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.25-34
    • /
    • 2022
  • This paper proposes a secret sharing based fast node authentication technique applicable to Flying Ad-Hoc Network (FANET) that can be used to construct self-organized communication network in multi drones and drone squadrons operations. Before deployment, each node stores an exponential share, exponential secret and a portion of PUF CRP table. After being deployed in the field, in the early-stage of network formation, each node broadcasts its ID, exponential share and a hash value of PUF Response and pseudo-random number. Then each node performs a reconstruction of the exponential secret using the exponential shares transmitted from neighboring nodes. When the exponential secret is reconstructed, simultaneous authentication is completed for all nodes that have transmitted the exponential share used in the reconstruction. A node that transmits an incorrect exponential share to disturb the reconstruction of the exponential secret during the authentication process can be detected before performing the reconstruction through the verification of the hash value, and will be excluded from the reconstruction.

Comparison of QuEChERS and Solid Phase Extraction for Accurate Determination of Pesticide Residues in Kimchi Cabbage and Strawberry using Isotope Dilution Mass Spectrometry

  • Seonghee Ahn;Kebede Gebeyehu Mekete;Byungjoo Kim
    • Mass Spectrometry Letters
    • /
    • v.14 no.4
    • /
    • pp.178-185
    • /
    • 2023
  • QuEChERS is used worldwide as a universal sample preparation method with many benefits, such as being quick, easy, cheap, effective, rugged and safe. This study examined whether QuEChERS can be employed in isotope dilution mass spectrometry (ID-MS) for accurate analysis of pesticides in food. The ratios of fortified values and measured values of malathion and fenitrothion using the QuEChERS method were compared with those using the solid phase extract (SPE) method which was previously used in this laboratory. The separations of the two pesticides on DB-5MS and VF-1701MS columns were compared. Malathion and fenitrothion were fortified into kimchi cabbage and pretreated with the QuEChERS method and the SPE method. The results obtained using the DB-5MS column varied according to the sample preparation method, column and pesticide level. Using the VF-1701 column, ratios were 98-102% by both QuEChERS and Carb/NH2 SPE method for all fortification level. Malathion and fenitrothion were fortified into strawberry samples for comparison with kimchi cabbage. The results for the strawberry samples indicated that the ratios were not influenced by the sample preparation methods or GC column. The QuEChERS method could be acceptable in the ID-MS method for pesticide residue analysis in food, however other conditions should be carefully considered for accurate determination, such as the column, amount of analyte and food matrix.