• 제목/요약/키워드: Identification Code

검색결과 349건 처리시간 0.028초

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • 제14권5호
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Comparison of Boiling Point and Distillaiion Ranige, Melting Range, and Identification Methods of Various Organizations on Synthetic Food Additives (식품첨가물에 대한 여러 기관의 비점 및 유분측정법, 융점측정법 및 확인시험법 비교)

  • Shin Dong-Hwa;Kim Yong-Suk;Lee Young-Hwan;Bang Jeong-Ho;Om Ae-Son;Shin Jae-Wook;Lee Tal-Soo;Jang Young-Mi;Hong Ki-Hyoung;Park Sung-Kwan;Kwon Yong-Kwan;Park Jae-Seok
    • Journal of Food Hygiene and Safety
    • /
    • 제20권3호
    • /
    • pp.134-140
    • /
    • 2005
  • Boiling point and distillation range, melting range, and identification methods in general test method of Korea, Japan, Joint FAO/WHO Expert Committee of Food Additives (JECFA), and USA on chemical food additives were compared. Boiling point of propylene glycol was indicated as boiling point in Korea, distillate in Japan, distillation range in JECFA and USA, and its value was up to the standard. Distillation range of propionic acid was indicated as distillate in Korea and Japan, distillation range in JECFA and USA, and its value was up to the standard. There is no standard on distillation range of isopropyl alcohol in Japanese method. Test method of melting range on synthetic food additives was identical in all organizations, and there are 28 items to which this test method applies in Korean Food Additives Code. The standards on molting range of D-mannitol were different in various organizations, and in USA method there are no standards to which L-ascorbic acid, calciferol, and fumaric acid apply. Synthetic food additives performing the identification test were 251 items in Korean Food Additives Code, but there are no items to which manganese, glycerophosphate, bromate, thiosulfate, and bromide apply. Calcium benzoate was dissolved by heating in benzoate test and we could not identify the citrate in ferric citrate by method (2) of Korea and Japan. Identification test methods for ammonium, lactate, magnesium, copper, sulfate, phosphate, and zinc were identical in all organizations, and these could be identifed by current identification methods.

A Study on the Revision of the Notification Form and Procedures of Marine Incident (준해양사고 통보서식 및 절차 개정에 관한 연구)

  • Kang, Suk-Young
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • 제26권1호
    • /
    • pp.39-46
    • /
    • 2020
  • Accident prevention is more important than follow-up, which is based on Heinrich's law. The marine incident system is a very meaningful system that can prevent similar accidents, and was introduced in 2010 in Korea in accordance with the enforcement of the Code for the Investigation of Marine Casualties and Incidents (CI Code). Based on the CI Code, ship owners or ship operators are required to notify the Central Chief Inspector using the designated notification form in the event of a marine incident, but the number of voluntary notifications is still small. In this regard, this study intends to provide a direction for improvement by conducting an in-depth analysis focusing on the lack of notification procedures and forms of the marine incident system. To this end, we analyzed related regulations, cases of excellent overseas shipping countries such as the United Kingdom and Singapore, cases of similar domestic transportation systems such as aviation and railways, and marine incident notification procedures and forms of leading shipping companies. Major improvements in the notification process include the transition of the marine incidents to voluntary reporting, the expansion of the reporting subjects, and the identification of the security of the informer's identity. The main contents of the notification form revision include the use of the term "reporting" instead of "notification," the content of the identity guarantee in the notification form, and the increase in statistical value through the expansion of optional entries.

A Study on the Method of High-Speed Reading of Postal 4-state Bar Code for Supporting Automatic Processing (우편용 4-state 바코드 고속판독 방법에 관한 연구)

  • Park, Moon-Sung;Kim, Hye-Kyu;Jung, Hoe-Kyung
    • The KIPS Transactions:PartD
    • /
    • 제8D권3호
    • /
    • pp.285-294
    • /
    • 2001
  • Recently many efforts on the development of automatic processing system for delivery sequency sorting have been performed in ETRI, which requires the use of postal 4-state bar code system to encode delivery points. This paper addresses the issue on the extension of read range and the improvement of image processing method. For the improvement of image processing procedure, applied information acquisition method through basic two thresholds onto the horizontal axial line of gray image based on reference information of 4-state bar code symbology. Symbol values are computed after creating two threshold values based on the obtained information through search of horizontal axial values. The implementation result of 4-state bar code reader are obtained the symbol values within 30~60 msec (58,000~116,000 mail item/hour)without noise removal or image rotation in spite of the incline $\pm 45^{\circ}$.

  • PDF

Plan and implementation of enhancing EPC-IS performance (EPC-IS성능 향상을 위한 방안 및 구현)

  • Chae Sang-Hyuk;Lee Na-Kgyu;Kim Jong-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 한국정보과학회 2006년도 한국컴퓨터종합학술대회 논문집 Vol.33 No.1 (D)
    • /
    • pp.43-45
    • /
    • 2006
  • Ubiquitous 핵심에 위치한 RFID(Radio Frequency IDentification)는 관련 H/W 및 S/W 기술의 발전에 따라 RFID 데이터를 수집하고 분석하여 이를 필요로 하는 응용 서비스에게 제공하거나 연동할 수 있는 RFID 데이터 처리 시스템이 요구된다. 본 논문은 EPCglobal의 표준을 따른 EPC-IS(Electronic Product Code Information Service)를 위한 성능 향상 방안을 제안한다. 제안을 바탕으로 구현한 EPC-IS는 Rule 기반의 Connection Point를 지원함으로써 Legacy Enterprise 시스템과 원활히 연동할 수 있을 뿐만 아니라 Policy 기반의 Backup Scheduling을 제공하여 RFID 시스템의 저장소 관리를 효율적으로 할 수 있는 RFID 데이터처리 시스템이다.

  • PDF

Improvements of the Anti-collision Algorithms for Multi Tag Interrogation in RFID System (RFID 시스템에서 다중 태그 인식을 위한 충돌회피 알고리즘의 성능 개선에 관한 연구)

  • NamGung, Ho-Young;Min, Byoung-Taek;Jeon, Jun-Soo;Kim, Cheol-Sung
    • Proceedings of the IEEK Conference
    • /
    • 대한전자공학회 2005년도 추계종합학술대회
    • /
    • pp.1169-1172
    • /
    • 2005
  • In this paper, we propose an improved anti-collision algorithm for multi tag interrogation in ubiquitous sensor network(USN) and show the result of simulation for multi tag interrogation in RFID systems. We have analyzed an EPC(Electronic Product Code) protocol which specifies the physical and logical requirements for a passive-backscatter Reader-Talk-First(RTF) RFID(Radio Frequency Identification) system operating in the $860MHz{\sim}960MHz$ frequency range. We have also designed and implemented the simulator of the RFID system based on the EPC protocol. Finally, we find that proposed algorithm works better than an existing algorithm.

  • PDF

Genome wide identification of Staufen2-bound mRNAs in embryonic rat brains

  • Maher-Laporte, Marjolaine;DesGroseillers, Luc
    • BMB Reports
    • /
    • 제43권5호
    • /
    • pp.344-348
    • /
    • 2010
  • Messenger ribonucleoprotein particles (mRNPs) are used to transport mRNAs along neuronal dendrites to their site of translation. Staufen2 is an mRNA-binding protein expressed in the cell bodies and cellular processes of different brain cells. It is notably involved in the transport of dendritic mRNAs along microtubules. Its knockdown expression was shown to change spine morphology and impair synaptic functions. However, the identity of Staufen2-bound mRNAs in brain cells is still completely unknown. As a mean to identify these mRNAs, we immunoprecipitated Staufen2-containing mRNPs from embryonic rat brains and used a genome wide approach to identify Staufen2-associated mRNAs. The genome wide approach identified 1780 mRNAs in Staufen2-containing mRNPs that code for proteins involved in cellular processes such as post-translational protein modifications, RNA metabolism, intracellular transport and translation. These results represent an additional and important step in the characterization of Staufen2- mediated neuronal functions in rat brains.

An Empirical Study on the Effect of Trust to RFID Technology Acceptance (신뢰가 RFID 기술수용에 미치는 영향에 관한 실증연구)

  • Lee, Mi-Sook
    • Journal of Technology Innovation
    • /
    • 제16권1호
    • /
    • pp.47-79
    • /
    • 2008
  • RFID(Radio Frequency Identification) technologies enjoy an enormous interest in all throughout the world, not only from the research but also from corporate practice. Although bar code is gradually substituted with RFID technology, the use of RFID technology in the companies is at the early stages and it's potential value isn't fully realized yet. RFID-related-trust is needed to solve these problems because these phenomena are related to uncertainties or risks disturbing RFID diffusion. This paper focuses on trust in the adoption of RFID and analyzes the effect to RFID technology acceptance of trust. This paper proposes 5 second constructs of trust; institutional trust, trust between companies, trust within company, technology trust, and service provider trust. In order to analyze some relationships between trust variable and 4 variables in TAM, structural equation modeling(SEM) is developed and SPSS 12.0 and AMOS 7.0 are used for analyses.

  • PDF

Korean Genderless Fashion Consumers' Self-image and Identification

  • Shin, Eun Jung;Koh, Ae-Ran
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • 제44권3호
    • /
    • pp.400-412
    • /
    • 2020
  • The "genderless fashion" style adopted by 20 to 30-year-olds in Korea cannot be ignored in the consumer fashion code. This study investigated self-images of Korean genderless fashion consumers through in-depth interviews. Interview analyses confirmed that Korean genderless fashion consumers express their self-image through clothing. As the theoretical framework, this study used Lacan's concept of desire to classify the types of self-image consumers want to express. The results are classified into three subject types: those who pursue self-fulfillment, those who pursue fulfillment from others, and those who pursue endless fulfillment through a self-image. This reflects various factors and the subjects' desires. Further, a subject's desire to present a specific self-image was an important factor in understanding the genderless fashion style. The study results revealed that modern fashion is an "unconscious" field of self-expression that crucially reflects individual desires. The study also contributes to the understanding of the concept of self-image at large.

Damage assessment of structures from changes in natural frequencies using genetic algorithm

  • Maity, Damodar;Tripathy, Rashmi Ranjan
    • Structural Engineering and Mechanics
    • /
    • 제19권1호
    • /
    • pp.21-42
    • /
    • 2005
  • A method is presented to detect and assess the structural damage from changes in natural frequencies using Genetic Algorithm (GA). Using the natural frequencies of the structure, it is possible to formulate the inverse problem in optimization terms and then to utilize a solution procedure employing GA to assess the damages. The technique has been applied to a cantilever beam and a plane frame, each one with different damage scenario to study the efficiency of the developed algorithm. A laboratory tested data has been used to verify the proposed algorithm. The study indicates the potentiality of the developed code to solve a wide range of inverse identification problems in a systematic way. The outcomes show that this method can detect and estimate the amount of damages with satisfactory precision.