• Title/Summary/Keyword: Identification Code

Search Result 345, Processing Time 0.026 seconds

A Design of Schema and Data Model for Shipping Distribution Field using Electronic Tag (전자태그의 해운 물류 유통 분야에 적용하기 위한 스키마 및 데이터 모델 설계)

  • Chang, Jung-Soo;Song, Jong-Chul;Choi, Il-Sun;Jeong, Jae-Gil;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.967-970
    • /
    • 2005
  • Ubiquitous Computing appeared, and moth researches are gone to apply this in various field. Specially, physical distribution circulation service field is intelligence enemy while alternate existent bar code and induction of RFID(Radio Frequency Identification) technology that permit various service is gone vigorously. In this treatise designed data model and schema to progress research about Core Event Type of PML(Product Markup Language) that is object information expression language that is proposed Auto-Id Lab and EPCglobal Inc. to process information of physical object and EPC-lS(Electronic Product Code Information Services) that is information services component and applies in sea transport physical logistics distribution service field.

  • PDF

Performance Evaluation of Anti-collision Algorithms in the Low-cost RFID System (저비용 RFID 시스템에서의 충돌방지 알고리즘에 대한 성능평가)

  • Quan Cheng-hao;Hong Won-kee;Lee Yong-doo;Kim Hie-cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1B
    • /
    • pp.17-26
    • /
    • 2005
  • RFID(Radio Frequency IDentification) is a technology that automatically identifies objects attached with electronic tags by using radio wave. For the implementation of an RFID system, an anti-collision algorithm is required to identify several tags within the RFID reader's range. Few researches report the performance trade-off among anti-collision algorithms in terms of the communications traffic between the reader and tags, the identification speed, and so on. In this paper, we analyze both tree based memoryless algorithms and slot aloha based algorithms that comprise of almost every class of existing anti-collision algorithms. To compare the performance, we evaluated each class of anti-collision algorithms with respect to low-cost RFID system with 96-bit EPC(Electronic Product Code). The results show that the collision tracking tree algorithm outperforms current tree based and aloha based algorithms by at least 2 times to 50 times.

Design and Implementation of the Localization System Using Distance Identification Code in Wireless Sensor Network (무선 센서네트워크에서 거리 식별코드를 이용한 위치인식시스템 설계 및 구현)

  • Choi, Chang-Yong;Lee, Dong-Myung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8A
    • /
    • pp.575-582
    • /
    • 2009
  • The localization algorithm(LAtu) using the IDentification Code($C_{ID}$) is suggested in RSS(Received Signal Strength) based Wireless Sensor Network(WSN), and the localization system using the suggested algorithm is designed and implemented in this paper. In addition to this, the performance of ranging correction quality and localization error of the localization system(System(LAtu)) that is developed using the LAtu is analyzed and compared with that of the localization system(System(LAieee)) using the channel model of IEEE 802.15.4 standard(LAieee) by the actual experimentation. From the experimentation, the ranging correction quality is analyzed that the LAtu is highly better than the channel model of LAieee about 34% under the distance between the moving module and the beacon module($D_{MM-BM}$) is 2m, and is also a few better than that of the LAieee about average 5% under the $D_{MM-BM}$ is above 5m. The localization error quality of the System(LAtu) is lower than that of the System(LAieee)) about 1cm under the lecture room and 4cm in the large lecture room.

Development of a Computer-Assisted Microbiological Quality Assurance Program for Hosipital Foodservice Operations (병원 급식시설의 미생물적 품질관리를 위한 전산 프로그램개발에 관한 연구)

  • Kwak, Tong-Kyung;Jang, Hye-Ja;Joo, Se-Young
    • Korean journal of food and cookery science
    • /
    • v.8 no.2
    • /
    • pp.137-145
    • /
    • 1992
  • A computer-assisted microbiological quality assurance program was developed based on HACCP data obtained from a 500 bed general hospital by assessing time and temperature conditions and microbiological qualities of six categories of menu items according to the process of food product flow. The purpose of the study was to develop a computer-assisted microbiological quality assurance program in order to simplify the assessment procedures and to provide a maximum assurance to foodservice personnel and the public. A 16-Bit personnel computer compatible with IBM-PC/AT was used. The data base files and processing programs were created using dBASE III plus packages. The contents of the computerized system are summarized as knows: 1. When the input program for hazard analysis runs, a series of questions are asked to determine hazards and assess their severity and risks. Critical control points and monitoring methods for CCPs are identified and saved in Master file. 2. Output and search programs for hazard analysis are composed of 6 categories of recipe data file list, code identification list, and HACCP identification of the specific menu item. 3. When the user selects a specific category of recipe from 6 categories presented on the screen and runs data file list, a series of menu item list, CCP list, monitoring methods list are generated. When the code search program runs, menu names, ingredients, amounts and a series of codes are generated. 4. When the user types in a menu item and an identification code, critical control points and monitoring methods are generated for each menu item.

  • PDF

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

Design of SSDT Cell ID Codes for W-CDMA System (W-CDMA 시스템의 SSDT 기지국 식별 부호 설계)

  • Song, Young-Joon
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.69-70
    • /
    • 2007
  • The code division multiple access (CDMA) system capacity is limited by the amount of interference of the system. To reduce the unnecessary interference, this paper proposes optimized cell identification (ID) codes for site selection diversity transmission (SSDT) power control in wideband code division multiple access system of third generation partnership project (3GPP). The proposed SSDT cell ID codes are designed to minimize the problem and to be easily decoded using simple fast Hadamard transformation (FHT) decoder.

  • PDF

Writer Verification Using Spatial Domain Features under Different Ink Width Conditions

  • Kore, Sharada Laxman;Apte, Shaila Dinkar
    • Journal of Computing Science and Engineering
    • /
    • v.10 no.2
    • /
    • pp.39-50
    • /
    • 2016
  • In this paper, we present a comparative study of spatial domain features for writer identification and verification with different ink width conditions. The existing methods give high error rates, when comparing two handwritten images with different pen types. To the best of our knowledge, we are the first to design the feature with different ink width conditions. To address this problem, contour based features were extracted using a chain code method. To improve accuracy at higher levels, we considered histograms of chain code and variance in bins of histogram of chain code as features to discriminate handwriting samples. The system was trained and tested for 1,000 writers with two samples using different writing instruments. The feature performance is tested on our newly created dataset of 4,000 samples. The experimental results show that the histogram of chain code feature is good compared to other methods with false acceptance rate of 11.67%, false rejection rate of 36.70%, average error rates of 24.18%, and average verification accuracy of 75.89% on our new dataset. We also studied the effect of amount of text and dataset size on verification accuracy.

Performance Analysis of RFID Interference Suppression System Based on the Gold Code (골드 코드 기반의 RFID 간섭제거 시스템 성능분석)

  • khadka, Grishma;Hwang, Suk-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1491-1497
    • /
    • 2013
  • Radio frequency identification (RFID) is an important and essential components of ubiquitous computing, with the development of wireless communication technologies and mobile computing environment. Recently, RFID becomes the mainstream application that helps fast handling and uniquely identifying the physical objects. It utilizes the electromagnetic energy for data transmission from a tag to a reader in the presence of arbitrary interference and noise. In order to employ the portable mobile RFID reader, a tag-collision problem between two or more adjacent tags should be considered. In this paper, we present the operation of RFID system in which numerous tags are present in the interrogation zone of a single reader at the same time. Since there may exist a number of tagged objects in the narrow area, multiple RFID tags may interfere each other, caused to degrade the data reliability and efficiency of the RFID system. In order to suppress interference signals from multiple neighboring tags, we present an application of Gold code for RFID communication system, which uses spread spectrum technique. In this RFID system, data bits are spreaded in each tags with the unique Gold code and the spreaded data bits are despreaded in the reader with the same Gold code. The performance analysis of the considered RFID anti-collision system is illustrated via computer simulation examples.

Scalable Fingerprinting Scheme based on Angular Decoding for LCCA Resilience (선형결합 공모공격에 강인한 각도해석 기반의 대용량 핑거프린팅)

  • Seol, Jae-Min;Kim, Seong-Whan
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.713-720
    • /
    • 2008
  • Fingerprinting scheme uses digital watermarks to trace originator of unauthorized or pirated copies, however, multiple users may collude and escape identification by creating an average or median of their individually watermarked copies. Previous research works are based on ACC (anti-collusion code) for identifying each user, however, ACC are shown to be resilient to average and median attacks, but not to LCCA and cannot support large number of users. In this paper, we propose a practical SACC (scalable anti-collusion code) scheme and its angular decoding strategy to support a large number of users from basic ACC (anti-collusion code) with LCCA (linear combination collusion attack) robustness. To make a scalable ACC, we designed a scalable extension of ACC codebook using a Gaussian distributed random variable, and embedded the resulting fingerprint using human visual system based watermarking scheme. We experimented with standard test images for colluder identification performance, and our scheme shows good performance over average and median attacks. Our angular decoding strategy shows performance gain over previous decoding scheme on LCCA colluder set identification among large population.

A Study of Spreading code for Watermarking of TxID of ATSC-DTV (ATSC-DTV의 송신기 식별을 위한 워터마킹용 확산코드에 관한 연구)

  • Cha Jae-Sang;Choi Seong-Jin;Lee Seon-Hee;Lee Kwang-Jik;Lee Yong-Tae;Park Goo-Man
    • Journal of Broadcast Engineering
    • /
    • v.11 no.1 s.30
    • /
    • pp.100-106
    • /
    • 2006
  • In this paper, we proposed a TxID(Transmitter Identification) system using ZCD (Zero Correlation Duration) code as interference-cancelled spread codes for single frequency network of ATSC terrestrial DTV broadcasting. ZCD codes are simply implemented and have ZCD characteristics. Then, Proposal system can fundamentally solve interference problems caused by ICI(Inter Code Interference) and MPI(Multi-Path Interference) which happens in TxID system using spread coding method. Also, those can cancel truncated error which happens at watermarking for TxID since those can remove its period. In this paper, we identified the availability of TxID system applying interference-cancelled ZCD codes by analyzing DER (Detection Error Rate) which is simulated in various interference environments such as AWGN, ICI, and MPI.