• Title/Summary/Keyword: Mobile RFID System

Search Result 250, Processing Time 0.022 seconds

Design and Development of Patient-aware System using Mobile Device (모바일 기기를 이용한 환자 자동인식 시스템의 설계 및 구현)

  • Lim, Jae-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1496-1504
    • /
    • 2007
  • The purpose of this paper, as a part of healthcare research, is to design and development Patient-aware System that will support EMR(Electronic Medical Record) in hospital. A mobile device-based system that can use database of existing EMR, replace existing paper-type chart, and identify patient fast and correctly was developed. To identify patient, RFID(Radio Frequency Identification) was used, and through interworking RFID and the system, it is possible to identify patient automatically. The developed system was tested in the test bed, and the possibility of faster diagnosis and treatment than existing paper-type chart was tested.

  • PDF

A Study on the RF Shower System to Extend Interrogating Range for the Low Power RFID Reader System (저출력 RFID 시스템에서 인식거리 확대를 위한 전력 공급용 RF Shower 시스템)

  • Jung, Jin-Wook;Bae, Jae-Hyun;Oh, Ha-Ryoung;Seong, Yeong-Rak;Song, Ho-Jun;Jang, Byeong-Jun;Choi, Kyung;Lee, Jung-Suk;Lee, Hong-Bae;Lee, Hak-Yong;Kim, Jong-Min;Shin, Jae-Cheol;Park, Jun-Seok
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.12
    • /
    • pp.526-533
    • /
    • 2006
  • In this paper, we presented the synchronization module between RF shower system and RFID Reader to extend interrogating range on Mobile RFID system, Costas Loop and FPLL(Frequency/phase Lock Loop) were used. We achieved compromised range of 3MHz locking frequency, 1ms locking time and figured out remarkable Hopping frequency of the Reader. The prototype of the new designed RFID system has been tested with ISO18000-6 type-B Tag. The read range between designed RFID Reader and Tag has been measured, it increased triple times by adjusting the Shower system output level.

Design of Security Protocol for RFID System using Mobile Reader (이동형 리더를 사용하는 RFID시스템의 보안 프로토콜 설계)

  • Jang, Bong-Im;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.954-955
    • /
    • 2012
  • Recently as increasing the use of mobile communication devices the use of mobile readers for recognition tag attached to objects is also increasing. Accordingly, meantime, that gives rise to the vulnerability of RFID systems between reader and tag security issues, as well as security issues between the reader and the back-end server will occur. In this paper between the reader and the back-end server to security vulnerabilities efficient authentication protocol using the hash function is proposed.

  • PDF

Development of an RFID Technology based Book Management System (RFID 기술 기반의 장서 관리 시스템 개발)

  • Im Gi-Duck;Lee Dong-Cheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.1015-1018
    • /
    • 2006
  • According to the number of the books in the library growing dramatically, dealing with them becomes a serious problem. Especially Plenty of budgets have been consumedin arranging and keeping the books. To solve these confronted problems, RFID technology is researched in this thesis. By utilizing the mobile RFID readers, Book Management System which makes possible to reduce time and cost to input the information of locationand present situation of books in real time is developed. Moreover since the active tag which uses the 900 radio frequency band and mobile RFID reader are used, it is possible to achieve multi-recognizing system.

  • PDF

A Design and Simulation of Mobile RFID Contents Expression Language for Bus Guidance Services (버스 안내 서비스를 위한 모바일 RFID 컨텐츠 표현 언어 설계 및 시뮬레이션)

  • Yeon Dong-Hee;Kim Yong-Woon;Yoo Sang-Keun;Lee Jun-Seob;Kim Hyoung-Jun;Jung Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1432-1438
    • /
    • 2005
  • The RFID (Radio Frequency Identification) technology is a non-contact identification system which can wireless reading of information, by attaching tags on objects; various applications of the technology are feasible throughout a dive of industries, and researches are currently under way. Recently, in connection with the wireless communication industry, application service models conveying information to the users through mobile devices with RFID readers were suggested. Such application service based on mobile RFID technology requires schema that models the form of data. Therefore, this study analyzes the mobile RFID application service model that will be serviced in the mobile environment, functions and elements of the protocol, and the interface, designing a language to process the data and express contents in the said service models, and we simulated the service for test it.

A Design of Language for Mobile RFID Application Contents Expression (모바일 RFID 응용 컨텐츠 표현 언어 설계)

  • Yeon, Dong-Hee;Kim, Yong-Woon;Yoo, Sang-Keun;Lee, Jun-Sub;Kim, Hyoung-Jun;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.975-978
    • /
    • 2005
  • The RFID(Radio Frequency Identification) technology is a non-contact identification system which can wireless reading of information, by attaching tags on objects; various applications of the technology are feasible throughout a diversity of industries, and researches are currently under way. Recently, in connection with the wireless communication industry, application service models conveying information to the users through mobile devices with RFID readers were suggested. Such application service based on mobile RFID technology requires schema that models the form of data. Therefore, this study analyses the mobile RFID application service model that will be serviced in the mobile environment, functions and elements of the protocol, and the interface, designing a language to process the data and express contents in the said service models.

  • PDF

Design of Regulated Low Phase Noise Colpitts VCO for UHF Band Mobile RFID System (UHF 대역 모바일 RFID 시스템에 적합한 저잡음 콜피츠 VCO 설계)

  • Roh, Hyoung-Hwan;Park, Kyong-Tae;Park, Jun-Seok;Cho, Hong-Gu;Kim, Hyoung-Jun;Kim, Yong-Woon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.8
    • /
    • pp.964-969
    • /
    • 2007
  • A regulated low phase noise differential colpitts VCO(Voltage Controlled Oscillator) for mobile RFID system is presented. The differential colpitts VCO meets the dense reader environment specifications. The VCO use a $0.35{\mu}m$ technology and achieves tuning range $1.55{sim}2.053 GHz$. Measuring 910 MHz frequency divider output, phase noise performance is -106 dBcMz and -135dBc/Hz at 40 kHz and 1MHz offset, respectively. 5-bit digital coarse-tuning and accumulation type MOS varactors allow for 28.2% tuning range, which is required to cover the LO frequency range of a UHF Mobile RFID system, Optimum design techniques ensure low VCO gain(<45 MHz/V) for good interoperability with the frequency synthesizer. To the author' knowledge, this differential colpitts VCO achieves a figure of merit(FOM) of 1.93dB at 2-GHz band.

A Study of Authentication of Using Multi-factor (다중체계 인증을 이용한 중요 시스템 보안 접근에 관한 연구)

  • Choi, Byeong-Hun;Kim, Sang-Geun;Bae, Je-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.73-80
    • /
    • 2009
  • Internet accidents have skyrocketed every year. It always has been threatened by the methods such as hacking and Spyware. The majority of security accident is formed of the loss of authentication information, and the internal user who is not authorized. The importance of security is also emphasized when someone tries to do something accessing to the main information system. Accordingly, Biometrics has been used in many ways. OTP, however, must have a few devices accessing to several systems, and Biometrics involve some risk of mis-recognition rate and mis-denial rate. It also has the risk possible to access to the main information system when losing OTP. This research reduced risks about the loss as separating RFID leader for mobile, Tag and the accessor's cellular phone, and is about pseudo random validation key generated from the administration system through contact with RFID leader for mobile and Tag. As sending the key to user's cell phone which is already registered, security is strengthened more than existing connection methods through the ID and password. RFID for mobile not generalized to the present has been studied as a tool accessing to the main information system.

Passive RFID Based Mobile Robot Localization and Effective Floor Tag Arrangement (수동 RFID 기반 이동로봇 위치 추정 및 효율적 노면 태그 배치)

  • Kim, Sung-Bok;Lee, Sang-Hyup
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.12
    • /
    • pp.1294-1301
    • /
    • 2008
  • Under passive RFID environment, this paper presents a new localization of a mobile robot traversing over the floor covered with tags, which is superior to existing methods in terms of estimation performance and cost effectiveness. Basically, it is assumed that a mobile robot is traveling along a series of straight line segments, each segment at a certain constant velocity, and that the number of tags sensed by a mobile robot at each sampling instant is at most one. First, for a given line segment with known starting point, the velocity and position of a mobile robot is estimated using the spatial and temporal information acquired from the traversed tag. Some discussions are made on the validity of the basic assumptions and the localization for the initial segment with unknown starting point. Second, for a given tag distribution density, the optimal tag arrangement is considered to reduce the position estimation error as well as to make easy the tag attachment on the floor. After reviewing typical tag arrangements, the pseudorandom tag arrangement is devised inspired from the Sudoku puzzle, a number placement puzzle. Third, through experiments using our passive RFID localization system, the validity and performance of the mobile robot localization proposed in this paper is demonstrated.

Design and Implementation of Fruits Warehouse Management System using Mobile Terminals (모바일 단말기에 의한 과일 창고 관리 시스템 구현)

  • Jang, Yong-Jae;Lee, Sung-Keun;Jung, Chang-Ryul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.486-493
    • /
    • 2010
  • This paper demonstrates the design and implementation of fruit larder system that is able to monitor and control restoration environment using mobile equipment. Based on RFID/USN technology, it builds wireless sensor network to enhance its efficiency to fruit larder environment and inventory management and performs automated environment management through window-based application that works in desktop environment. Additionally, using WINC service, it provides remote control function for fruit larder using mobile equipment.