• Title/Summary/Keyword: TRACE code

Search Result 127, Processing Time 0.034 seconds

Tag Mis-recognition Detection using RFID Tag Sensitivity in Logistics System (물류 시스템에서 RFID 태그 수신감도를 이용한 태그 오인식 검출)

  • Kim, Youngmin;Kang, Euisun
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.8
    • /
    • pp.9-17
    • /
    • 2015
  • One of RFID features is that each RFID tag has a unique identifying code. Logistic System utilizes RFID tag as location tracing, understanding stock or etc. On the other hand, there is a problem of overall lower recognition rate by getting the information of non-mobility tags with no need for reading. To solve this problem, we trace and analyze variation of moving and moveless RFID tag sensitivity by the hour. In analyzed data, we verify that tag sensitivity of mobile RFID is gradually increase while non-mobility tag has same intensity value. In order to detect mobile tag, we generate a function using Matlab with analyzed data and separate moving tags from non-mobility tags by software. As a result, we can confirm that non-mobility tags are detected by software and recognition rate of RFID tag is improved by separating moveless tag.

(Theoretical Performance analysis of 12Mbps, r=1/2, k=7 Viterbi deocder and its implementation using FPGA for the real time performance evaluation) (12Mbps, r=1/2, k=7 비터비 디코더의 이론적 성능분석 및 실시간 성능검증을 위한 FPGA구현)

  • Jeon, Gwang-Ho;Choe, Chang-Ho;Jeong, Hae-Won;Im, Myeong-Seop
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.39 no.1
    • /
    • pp.66-75
    • /
    • 2002
  • For the theoretical performance analysis of Viterbi Decoder for wireless LAN with data rate 12Mbps, code rate 1/2 and constraint length 7 defined in IEEE 802.11a, the transfer function is derived using Cramer's rule and the first-event error probability and bit error probability is derived under the AWGN. In the design process, input symbol is quantized into 16 steps for 4 bit soft decision and register exchange method instead of memory method is proposed for trace back, which enables the majority at the final decision stage. In the implementation, the Viterbi decoder based on parallel architecture with pipelined scheme for processing 12Mbps high speed data rate and AWGN generator are implemented using FPGA chips. And then its performance is verified in real time.

Design and Implementation of RFID-based Airway Logistics System for Ubiquitous Environments (유비쿼터스 환경을 위한 RFID 기반의 항공 물류 시스템의 설계 및 구현)

  • Jang, Sung-Ho;Ma, Yong-Beom;Noh, Chang-Hyeon;Park, Yang-Jae;Kim, Kyo-Hyeon;Cha, Heung-Suk;Lee, Jong-Sik;Kim, Jea-Moung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.297-306
    • /
    • 2007
  • Bar-code based airway logistics systems have many problems like freight loss and data management error due to semiskilled air-cargo process and individual information system. To solve these problems, this paper analyzed how to process an air-cargo practically and designed and implemented the RFID-based airway logistics system. This system has an information service system which manages data from RFID systems in realtime and provides a communication interface for data sharing. And, this system precesses data queries from capture applications and access applications to provide various services to users such as the freight track and trace service. Also, this system includes a H/H reader agent to integrate existing bar-cord systems. It allows us to realize automation and information-oriented air-cargo process and achieve improvement of air-cargo services with reduction of freight loss and management error.

  • PDF

Application features of The detailed rules of Census (1896) through the change of house Kan numbers in Gyeonpyeong-bang, Jung-seo in Hanseong-bu -Focused on Gyeonpyeong-bang 1-tong to 23-tong in 1903 and 1906- (한성부 중서 견평방에서 가택 칸수의 변화를 통해서 살펴본 「호구조사세칙」(1896)의 적용 양상 -1903년과 1906년의 견평방 1통에서 23통까지를 대상으로-)

  • Cho, Yun-O;Woo, Don-Son
    • Journal of architectural history
    • /
    • v.28 no.6
    • /
    • pp.19-30
    • /
    • 2019
  • This study explores the application aspect of The detailed rules of Census (1896) through the change of Kan numbers in Gyeonpyeong-bang. Although Gyeonpyeong-bang was a high-priority area because of its location, it was difficult to trace the operation of the urban situation due to lack of data. This study is focusing on restoring space and society in the Gyeonpyeong-bang using the information on the type of houses and the number of Kan listed in the family register of Hanseong-bu. The detailed rules of Census sets out provisions for the family registry and the rules of making Tong. Especially when it comes to the rules of making Tong, this rule deals with the code of making ten Hos into one Tong. This study was conducted by dividing the status of the Tong into three types: uncompleted Tong, exceeded Tong without vacant Ho number, and exceeded Tong with the vacant Ho number. Since these three types of Tong are in the process of change towards the complete Tong with 10 Hos, they were thought to be able to demonstrate the specific application of the rules. This study will be meaningful as a case study that expands the point of existing research on the Tong making rules, which was not focused relatively on restoring urban conditions at that time, by looking at the changes in exceptions that deviated from the Sipgajaktong rule.

Molecular Dynamics Study of [C10mim][Br] Aggregation (분자동역학을 이용한 [C10mim][Br] 의 응집에 관한 연구)

  • Yoon, Hong-Min;Lee, Joon-Sang
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.36 no.8
    • /
    • pp.873-876
    • /
    • 2012
  • Ionic liquids (ILs) existing in the liquid ion form under standard conditions show a unique properties. 1-10-Alkyl-3-methyl-imidazolium bromide ([C10mim][Br]) is one of the ILs that shows amphiphilic characteristics under specific conditions. This property enables it to function as a surfactant, and therefore, it finds applications in a wide range of areas. In this study, we tried to predict the behavior, especially the aggregation aspect, of [C10mim][Br] in an aqueous solution using molecular dynamics (MD) simulations. The canonical (NVT) ensemble was used to relax the system and trace the trajectory of atoms. Several case studies were simulated and the interaction among [C10mim]+, [Br]-, and water was analyzed using the radial distribution function of each atom. The density distribution function was also used for the structural analysis of the entire system. We used the Large-scale Atomic/Molecular Massively Parallel Simulator (LAMMPS) code for the present MD simulations.

Design & Implementation of Drug Management System based on RFID (RFID기반의 특수의약품 추적관리 시스템 설계 및 구현)

  • Lee, Bong-Keun
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.977-984
    • /
    • 2006
  • This paper is intended to trace and management of drug based on RFID Technology at a circulation market, from manufacturer to end user, of drug. To avoid counterfeit and generic drug and establish of order in the circulation of drug, at the moment of manufacturing, tags for each bottle and each box are tagged. and then from factory to hospital, through whole logistics, e-pedigree for the drug is made and monitored. Using inventory information, it is easy to manage and control stock of drug. In addition to, RFID System enables storing and delivery to be simple, process time to be shortened. As this research is to study of applying RFID to drug, in this paper, standard RFID code for drug is suggested and tried to apply domestic middle win. Finally, the result of tag pattern design and how to tag for the drug based on 90Mhz is proposed

Number of Different Solutions to x5+bx3+b2mx2+1=0 over GF(2n) (GF(2n)위에서 x5+bx3+b2mx2+1=0의 서로 다른 해의 개수)

  • Choi, Un-Sook;Cho, Sung-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.11
    • /
    • pp.1749-1754
    • /
    • 2013
  • Binary sequences of period $2^n-1$ are widely used in many areas of engineering and sciences. Some well-known applications include coding theory, code-division multiple-access (CDMA) communications, and stream cipher systems. In this paper we analyze different solutions to $x^5+bx^3+b^{2^m}x^2+1=0$ over $GF(2^n)$. The number of different solutions determines frequencies of cross-correlations of nonlinear binary sequences generated by $d=3{\cdot}2^m-2$, n=2m, m=4k($k{\geq}2$). Also we give an algorithm for determination of number of different solutions to the equation.

Analysis of Linear Span of Non-linear Binary Sequences with Decimation d=2m-2(2m+3) (데시메이션이 d=2m-2(2m+3)인 비선형 이진수열의 선형스팬 분석)

  • Yim, Ji-Mi;Cho, Sung-Jin;Kim, Han-Doo;Kim, Seok-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.609-616
    • /
    • 2014
  • Large linear span makes difficult to predict, so this study is important to the security and code system. It has been studied about the non-linear binary sequences having low correlation values and large linear span. In this paper we analyze the linear span of $S^r_a(t)=Tr^m_1\{[Tr^n_m(a{\alpha}^t+{\alpha}^{dt})]^r\}$ ($a{\in}GF(2^m)$, $0{\leq}t{\leq}2^m-2$) where n=2m and $d=2^{m-2}(2^m+3)$.

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

A Study on PIXE Spectrum Analysis for the Determination of Elemental Contents (원소별 함량결정을 위한 PIXE 스펙트럼 분석에 관한 연구)

  • Jong-Seok OH;;Hae-ILL Bak
    • Nuclear Engineering and Technology
    • /
    • v.22 no.2
    • /
    • pp.101-107
    • /
    • 1990
  • The PIXE (Proton Induced X-ray Emission) method is applied to the quantitative analysis of trace elements in tap water, red wine, urine and old black powder samples. Sample irradiations are performed with a 1.202 MeV proton beam from the SNU 1.5-MV Tandem Van de Graaff accelerator, and measurements of X-ray spectra are made by the Si(Li) spectrometer To increase the sensitivity of analysis tap water is preconcentrated by evaporation method. As an internal standard, Ni powder is mixed with black powder sample and yttrium solution is added to the other samples. The analyses of the PIXE spectra are carried out by using the AXIL (Analytical X-ray Analysis by Iterative Least-squares) computer code, in which the routine for least-squares method is based on the Marquardt algorithm. The elements such as Mg, Al, Si, Ti, Fe and Zn are analyzed at sub-ppm levels in the tap water sample. In the red wine sample prepared without preconcentration. the element Ti is detected in the amount of 3ppm. In conclusion, the PIXE method is proved to be appropriate for the analysis of liquid samples by relative measurements using the internal standard. and is expected to be improved by the use of evaluated X-ray production cross-sections and the development of sample preparation techniques.

  • PDF