• Title/Summary/Keyword: RFID applications

Search Result 321, Processing Time 0.024 seconds

Indoor Positioning Using RFID Technique (RFID 기술을 이용한 실내 위치 추적)

  • Yoon, Chang-sun;Kim, Tae-in;Kim, Hyeon-jin;Hong, Yeon-chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.207-214
    • /
    • 2016
  • RFID technology is a technology perceiving information with the device called reader and tag which is now used in public transportation such as Hi-pass. In this paper, we design a system which tracks indoor location using this technology. GPS, the most frequently used location-tracking system, has a defect that its accuracy decreases when the device is indoor. In suggested experiment, we simulate signals according to the moving of located objects, then compare with the result of the experiment. Based on the extracted data, we inform data which is for the purpose of tracking system based on analysis of the route and errors. Simulations for the tracking were performed with relocation of real objects. In the real experiment, we arrange the readers around the room and move the tagged object that we like to know the location, then analyze the data from the equipment. This paper suggests the analyzed data for the future indoor tag tracking applications. We expect that the RFID based location positioning data will be used for other indoor positioning research and development.

Disproportional Insertion Policy for Improving Query Performance in RFID Tag Data Indices (RFID 태그 데이타 색인의 질의 성능 향상을 위한 불균형 삽입 정책)

  • Kim, Gi-Hong;Hong, Bong-Hee;Ahn, Sung-Woo
    • Journal of KIISE:Databases
    • /
    • v.35 no.5
    • /
    • pp.432-446
    • /
    • 2008
  • Queries for tracing tag locations are among the most challenging requirements in RFID based applications, including automated manufacturing, inventory tracking and supply chain management. For efficient query processing, a previous study proposed the index scheme for storing tag objects, based on the moving object index, in 3-dimensional domain with the axes being the tag identifier, the reader identifier, and the time. In a different way of a moving object index, the ranges of coordinates for each domain are quite different so that the distribution of query regions is skewed to the reader identifier domain. Previous indexes for tags, however, do not consider the skewed distribution for query regions. This results in producing many overlaps between index nodes and query regions and then causes the problem of traversing many index nodes. To solve this problem, we propose a new disproportional insertion and split policy of the index for RFID tags which is based on the R*-tree. For efficient insertion of tag data, our method derives the weighted margin for each node by using weights of each axis and margin of nodes. Based the weighted margin, we can choose the subtree and the split method in order to insert tag data with the minimum cost. Proposed insertion method also reduces the cost of region query by reducing overlapped area of query region and MBRs. Our experiments show that the index based on the proposed insertion and split method considerably improves the performance of queries than the index based on the previous methods.

Agricultural and Stockbreeding Products Recommender System Using RFID Based Traceability System (RFID 기반 이력추적 시스템을 이용한 농축산물 추천방법)

  • Kim, Jae-Kyeong;Kim, Hyea-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.2
    • /
    • pp.207-222
    • /
    • 2008
  • This research suggests the method of how to build agricultural and stockbreeding products recommender systems based on RFID technology for monitoring crop and livestock production, tracing production history as an application strategy. In the past the studies on enterprise applications have been barely implemented owing to the rack of business model and limitation of technical development. Currently however there have been enormous technological progress of RFID and agricultural and stockbreeding products retailing sites are increased. Therefore this paper suggests PDCF-ASP(Profile Decay based Collaborative Fltering for Agricultural and Stockbreeding Products) which is designed to reduce customers… search efforts in finding safety and fresh products on the internet shopping mall. For this, product decay function is defined to make sure whether the products are safety or not and to adopt a change in customer preferences. And for the implementation of PDCF-ASP, the system structure including functional agents is schematized.

  • PDF

Research on An Equivalent Antenna Model for Induced Human Body Current by RFID Reader Antenna of HF Band (단파(HF) 대역 RFID 리더 안테나에 의한 인체 유도 전류의 등가 안테나 모형 연구)

  • Lee, Jong-Gun;Byun, Jin-Kyu;Choi, Hyung-Do;Cheon, Chang-Yul;Lee, Byung-Je;Chung, Young-Seek
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.6
    • /
    • pp.503-508
    • /
    • 2009
  • There are many researches on human effect by electromagnetic equipments and applications. However, most of research and guidelines for limiting human exposure to electromagnetic fields are established by mobile communication of SAR(Specific Absorption Ratio). Therefore we need to study different effects on human body when exposed to high frequency(HF) band equipments, such as human induced current etc. In this paper, we measured human induced current by RFID reader antenna of HF band in the near field and we propose human equivalent antenna which has orthogonal loops to each other. Then, we compared the induced currents on proposed equivalent antenna with human.

Design of a Multi-Thread Architecture for an LLRP Server (LLRP(Low Level Reader Protocol) 서버를 위한 멀티쓰레드 구조의 설계)

  • Lee, Tae-Young;Kim, Yun-Ho;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • The KIPS Transactions:PartA
    • /
    • v.19A no.2
    • /
    • pp.93-100
    • /
    • 2012
  • LLRP (Low-Level Reader Protocol) specifies an interface between RFID readers and RFID applications, also called LLRP servers and clients respectively. An LLRP server should concurrently execute various functions. This paper designs an LLRP server of a multi-threaded architecture. For that, (i) the operational procedure between LLRP servers and clients is investigated, (ii) the functional requirements of LLRP servers are presented, (iii) the operation of an LLRP server is decomposed into several threads to satisfy those functional requirements, and (iv) the operational procedure is further examined in thread-level. To validate the designed architecture, it is modeled and simulated by using the DEVS formalism which specifies discrete event systems in a hierarchical, modular manner. From the simulation result, we can conclude that the proposed architecture conforms the LLRP standard and satisfies all the given functional requirements.

Automatic recognition of the old and the infirm using Arduino technology implementation (아두이노를 사용하여 노약자 자동 인식 기술 구현)

  • Choi, Chul-kil;Lee, Sung-jin;Choi, Byeong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.454-457
    • /
    • 2014
  • Arduino is for design based on open source prototyping platform, artist, designer, hobby activists, etc, i has been designed for all those who are interested in the environment construct. Arduino adventage you can easily create applications hardware, without deep knowledge about the hardware. Configuration of arduino using AVR microcontroller ATmage 168, software to action arduino using arduino program, MATLAB, Processing. Arduino is open source base, you can hardware production directly and using shield additionally, the arduino can be combined. Android is open source. Continue to expand through a combination of hardware, Arduino. It name is shield. Be given to the Arduino Uno board to the main board, the shield extends to the various aspects and help can be equipped with more features. The shield on top of the shield can be combined as a kind of shield and Ethernet shield, motor shield, the shield RFID hardware beyond a simple extension can be configured. In this paper, RFID technology Sealed for automatic recognition of the elderly by the elderly to identify and tag them SM130 13.56Mhz compatible hardware was constructed by combining tags.

  • PDF

A Tag Proximity Information Acquisition Scheme for RFID Yoking Proof (RFID 요킹증명을 위한 인접태그 정보 획득 기법)

  • Ham, Hyoungmin
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.476-484
    • /
    • 2019
  • RFID yoking proof proves that a pair of tags is scanned at the same time. Since the tags scanned simultaneously by a single reader are adjacent to each other, the yoking proof is used in applications that need to check the physical proximity of tagged objects. Most of the yoking proof schemes require pre-knowledge on adjacent tags. If an error occurs in the process of collecting information about adjacent tags, all subsequent proofs will fail verification. However, there is no research that suggests specific methods for obtaining information about adjacent tags. In this study, I propose a tag proximity information acquisition scheme for a yoking proof. The proposed method consists of two steps: scanning area determination and scanning area verification. In the first step, the size and position of the area to scan tags is determined in consideration of position and transmission range of the tags. In the next step, whether tag scanning is performed within the scanning area or not is verified through reference tags of the fixed position. In analysis, I show that the determined scanning area assures acquisition of adjacent tag information and the scanning area verification detects deformation and deviation of the scanning area.

A Tag Response Loss Detection Scheme for RFID Group Proof (RFID 그룹증명을 위한 응답손실 감지기법)

  • Ham, Hyoungmin
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.637-645
    • /
    • 2019
  • The RFID group proof is an extension of the yoking proof proving that multiple tags are scanned by a reader simultaneously. Existing group proof schemes provide only delayed tag loss detection which detects loss of tag response in a verification phase. However, delayed tag loss detection is not suitable for real-time applications where tag loss must be detected immediately. In this study, I propose a tag response loss detection scheme which detects loss of tag response in the proof generation process quickly. In the proposed scheme, the tag responds with the sequence number assigned to the tag group, and the reader detects the loss of the tag response through the sequence number. Through an experiment for indistinguishability, I show that the sequence number is secure against an analyzing message attack to distinguish between specific tags and tag groups. In terms of efficiency, the proposed scheme requires fewer transmissions and database operations than existing techniques to determine which tags response is lost.

A Slot Allocated Blocking Anti-Collision Algorithm for RFID Tag Identification

  • Qing, Yang;Jiancheng, Li;Hongyi, Wang;Xianghua, Zeng;Liming, Zheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2160-2179
    • /
    • 2015
  • In many Radio Frequency Identification (RFID) applications, the reader recognizes the tags within its scope repeatedly. For these applications, some algorithms such as the adaptive query splitting algorithm (AQS) and the novel semi-blocking AQS (SBA) were proposed. In these algorithms, a staying tag retransmits its ID to the reader to be identified, even though the ID of the tag is stored in the reader's memory. When the length of tag ID is long, the reader consumes a long time to identify the staying tags. To overcome this deficiency, we propose a slot allocated blocking anti-collision algorithm (SABA). In SABA, the reader assigns a unique slot to each tag in its range by using a slot allocation mechanism. Based on the allocated slot, each staying tag only replies a short data to the reader in the identification process. As a result, the amount of data transmitted by the staying tags is reduced greatly and the identification rate of the reader is improved effectively. The identification rate and the data amount transmitted by tags of SABA are analyzed theoretically and verified by various simulations. The simulation and analysis results show that the performance of SABA is superior to the existing algorithms significantly.

A Study on the NFC Services for Social Networking Applications (소셜 네트워킹 응용을 위한 NFC 서비스에 관한 연구)

  • Roh, Jae-Sung;Kim, Wan-Tae;Lee, Man-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.568-570
    • /
    • 2013
  • NFC represents the 2nd generation of the proximity contact-less technology, which beyond the RFID, supports peer-to-peer communication, and enables consumer access to aggregated services, anytime, anywhere, with any type of consumer stationary and mobile devices. NFC is a short range device wireless technology designed to exchange data, initiate connections with other wireless networks and act as a secured smart key for access to services such as cashless payment, ticketing, on-line entertainment and access control. In this paper, the NFC services for social networking applications are studied, and the signal flow of SNS application based on NFC P2P for smart devices and server model is proposed.

  • PDF