• Title/Summary/Keyword: RFID 오류

Search Result 55, Processing Time 0.023 seconds

Smart Browser based on Semantic Web using RFID Technology (RFID 기술을 이용한 시맨틱 웹 기반 스마트 브라우저)

  • Song, Chang-Woo;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.12
    • /
    • pp.37-44
    • /
    • 2008
  • Data entered into RFID tags are used for saving costs and enhancing competitiveness in the development of applications in various industrial areas. RFID readers perform the identification and search of hundreds of objects, which are tags. RFID technology that identifies objects on request of dynamic linking and tracking is composed of application components supporting information infrastructure. Despite their many advantages, existing applications, which do not consider elements related to real.time data communication among remote RFID devices, cannot support connections among heterogeneous devices effectively. As different network devices are installed in applications separately and go through different query analysis processes, there happen the delays of monitoring or errors in data conversion. The present study implements a RFID database handling system in semantic Web environment for integrated management of information extracted from RFID tags regardless of application. Users’ RFID tags are identified by a RFID reader mounted on an application, and the data are sent to the RFID database processing system, and then the process converts the information into a semantic Web language. Data transmitted on the standardized semantic Web base are translated by a smart browser and displayed on the screen. The use of a semantic Web language enables reasoning on meaningful relations and this, in turn, makes it easy to expand the functions by adding modules.

의료분야에서의 RFID/USN 기술 적용 현황

  • Park, Dong-Gyun;Jeong, Eun-Yeong;Jeong, Guk-Sang
    • Information and Communications Magazine
    • /
    • v.25 no.10
    • /
    • pp.50-57
    • /
    • 2008
  • 의료사고 증대와 비효율적 업무환경의 문제를 개선하기 위해 의료분야에서는 광범위한 RFID/USN기술의 적용을 고려하고 있다. RFID수동형 태그는 수혈 안정성 향상, 수술 오류 감소 및 수술실 내 환자 위치 확인, 투약 사고 방지, 환자 확인, 소모품 관리 등에 사용되며, 능동형 태그는 의사, 환자, 이동성 장비의 실시간 위치 추적 등에 사용된다. 하지만 의료기기 전파간섭, 보안 및 표준화, 특수환경에서 인식률 저하, 단기 투자비용 증대 등의 문제로 대부분의 적용 사례가 시범서비스 형태에 머무르며 활성화되지 못하고 있다. 본고에서는 의료진 및 환자관리, 자산관리, 의약품관리, 혈액관리 분야의 적용 사례 분석, 문제점 및 활성화 방안에 관하여 알아본다.

A Study on the Logistics Information Synchronization based Smart SCM Model (물류정보동기화 기반의 Smart SCM 모델에 관한 연구)

  • Kim, Jang-Goon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1595-1598
    • /
    • 2012
  • 최근들어 RFID 기반의 SCM에 대한 연구는 많이 진행되고 있다. 그러나 공급망상에서 이동중인 물류정보의 오류를 동기화하고, 장치기반 인프라의 상태정보를 모니터링하여 활성화해주는 연구와 기술은 아직 미흡하다. "물류정보동기화 기반의 Smart SCM 모델"은 실시간으로 각 물류 거점에 설치된 RFID 인프라 장치 및 물류 프로세스 동기화 현황을 Dashboard를 통하여 모니터링하고, 예외상황 발생시에 다양한 의사결정 지원정보 제공을 통해 즉각적인 상황 조치가 가능한 지능형 공급망 통합관제 서비스 모델이다. 본 연구 모델은 물류국제 표준, RFID관련 국제 표준 규격, EPCIS 표준, SSI 미들웨어 플랫폼을 준용하여 표준화 하므로써 관련 기술 국내 표준 규격을 제시하고자 하였다.

Multiple Object Tracking and Identification System Using CCTV and RFID (감시 카메라와 RFID를 활용한 다수 객체 추적 및 식별 시스템)

  • Kim, Jin-Ah;Moon, Nammee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.51-58
    • /
    • 2017
  • Because of safety and security, Surveillance camera market is growing. Accordingly, Study on video recognition and tracking is also actively in progress, but There is a limit to identify object by obtaining the information of object identified and tracked. Especially, It is more difficult to identify multiple objects in open space like shopping mall, airport and others utilized surveillance camera. Therefore, This paper proposed adding object identification function by using RFID to existing video-based object recognition and tracking system. Also, We tried to complement each other to solve the problem of video and RFID based. Thus, through the interaction of system modules We propose a solution to the problems of failing video-based object recognize and tracking and the problems that could be cased by the recognition error of RFID. The system designed to identify the object by classifying the identification of object in four steps so that the data reliability of the identified object can be maintained. To judge the efficiency of this system, this demonstrated by implementing the simulation program.

Design and Implementation of a Smart Biological Cabinet using RFID (RFID 기반 스마트 생물학 실험실 캐비닛의 설계 및 구현)

  • Han, Youngwhan;Kim, Byungho;Eun, Seongbae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.4
    • /
    • pp.611-616
    • /
    • 2018
  • RFID-based Smart cabinets can make a recognition error owing to the electromagnetic wave interference. This paper proposes and implements a smart cabinet system for inventory management using RFID, especially which can be applied to biological laboratories. We calculate the optimal value of partition distance for the higher recognition rate between RFID tags and the reader, and the optimal partition thickness for electromagnetic wave absorption to achieve the higher recognition rate, in which two kinds of the partitions have been tested, a pure steel partition with various thickness and a thin steel partition attached with electromagnetic waves absorber. The experimental results show that the most recommended partition structure for the smart cabinets is one with the partition distance of 30cm and the partition thickness of 1mm attached with the electromagnetic wave absorption tapes.

A Secure RFID Multi-Tag Search Protocol Without On-line Server (서버가 없는 환경에서 안전한 RFID 다중 태그 검색 프로토콜)

  • Lee, Jae-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.405-415
    • /
    • 2012
  • In many applications a reader needs to determine whether a particular tag exists within a group of tags without a server. This is referred to as serverless RFID tag searching. A few protocols for the serverless RFID searching are proposed but they are the single tag search protocol which can search a tag at one time. In this paper, we propose a multi-tag search protocol based on a hash function and a random number generator which can search some tags at one time. For this study, we introduce a protocol which can resolve the problem of synchronization of seeds when communication error occurs in the S3PR protocol[1], and propose a multi-tag search protocol which can reduce the communication overhead. The proposed protocol is secure against tracking attack, impersonation attack, replay attack and denial-of-service attack. This study will be the basis of research for multi-tag serach protocol.

Development of RFID for Automatic Radiopharmaceuticals Preparation System (방사성 의약품 자동합성 장치용 RFID 시스템의 개발)

  • Kim, Myung-Sik;Kim, Kwang-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5C
    • /
    • pp.429-436
    • /
    • 2012
  • In this paper, an RFID system for the automatic preparation system of positron emission tomography (PET) radiopharmaceuticals is developed. Since the preparation system uses radioactive isotope, the preparation system is generally placed in lead-shielded hot-cell. Disposable cassettes including tubes and valves are used in the preparation system, since they are easily contaminated by radioactivity during preparation of radiopharmaceuticals. Currently, a system for preventing re-use of the cassette and managing the information about the preparation precess and result independently from the PC which control the preparation system is highly required for preventing danger from the radiation accident. Since RFID can store and re-write relatively large amount of information, it is suitable for the purpose. However, it is hard to read multiple cassettes' information using antennas installed on the metallic surfaces with current RFID systems. For the problem, we improve RFID system in two directions. First, the interface of the RFID reader is changed then it is possible that multiple readers can be daisy-chained. Also, antenna is tuned while inserting in a metallic coated antenna case, then the effect from the metallic surface of the preparation system is minimized. The test result using the developed system shows that the developed RFID system can read multiple tags using the antennas which are attached on the metallic surface.

Loading/Unloading Decision System of Ship Block in the Shipyard (조선소 선박 블록 상.하차 판단 시스템)

  • Park, Jeong-Ho;Lee, Kyong-Hee;Jin, Gwang-Ja;Oh, Moon-Kyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.40-46
    • /
    • 2010
  • It is an important element increasing ship production to manage an accurate position of transporters(TP) and ship blocks in a shipyard. However, most works are presently being performed by judgment of a system manager and skilled workers. This paper introduced about the system for tracking an accurate position of the transporters and the blocks which are main mobile objects in the shipyard, and proposed a method to decide whether or not a loading/unloading state of the blocks, which is one of the most important functions of the tracking system. Three sensors were used in order to implement the method. One is a RFID reader to identify a target block, another is a RFID reader to estimate a position of the TP as it recognizes a underground tag. The other is a ultrasonic sensor to detect an object. Two experiments were carried out in the shipyard. After correcting errors found on the first experiment. we confirmed that the result could be applied to the shipbuilding yard from the final experiment.

A Study on Management Method of Infectious Wastes Applying RFID (감염성 폐기물 관리를 위한 RFID 적용에 관한 연구)

  • Joung, Lyang-Jae;Sung, Nak-Chang;Kang, Hean-Chan;Kang, Dae-Seong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.63-72
    • /
    • 2007
  • Recently, as recognizing the risk about the infection of an infectious wastes, the problems about the management and treatment of the infectious wastes stand out socially. In this paper, as being possible monitoring whole processing from the origin of the infectious waste to the processing plant, using the RFID which is the kernel technology of the next generation, we tried to solve the second infection problem by inefficient treatment of the infectious wastes. Through the research suggesting in this paper, as storing and monitoring the procedural business articles and the problem about miss-writing and input error being found in management system like documentary writing by the existing manager and computation input by the web application, we can understand the management state, immediately. And the Bio information for the personal authentication is carried out through storing the feature vector calculation by the PCA algorithm, into the tag. It suggested more systematic and safer management plan than previous thing, as giving attention about the wastes to manager.

  • PDF

Improved cryptanalysis of lightweight RFID mutual authentication Protocols LMAP, $M^2AP$, EMAP (경량 RFID 상호인증 프로토콜 LMAP, $M^2AP$, EMAP에 대한 향상된 취약성 분석)

  • Kwon, Dae-Sung;Lee, Joo-Young;Koo, Bon-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.103-113
    • /
    • 2007
  • In this paper, we present a security analysis of Lightweight RFID Mutual Authentication Protocols-LMAP[10], $M^2AP$[11], EMAP[12]. Based on simple logic operations, the protocols were designed to be suitable for lightweight environments such as RFID systems. In [8,9], it is shown that these protocols are vulnerable to do-synchronization attacks with a high probability. The authors also presented an active attack that partially reveals a tag's secret values including its ID. In this paper, we point out an error from [9] and show that their do-synchronization attack would always succeed. We also improve the active attack in [9] to show an adversary can compute a tag's ID as well as certain secret keys in a deterministic way. As for $M^2AP$ and EMAP, we show that eavesdropping $2{\sim}3$ consecutive sessions is sufficient to reveal a tag's essential secret values including its ID that allows for tracing, do-synchronization and/or subsequent impersonations.