• Title/Summary/Keyword: Tags

Search Result 1,307, Processing Time 0.025 seconds

An Implementation of a Virtual RFID Emulator System using a Commercial CAD tool (상용 CAD 툴을 이용한 RFID 에뮬레이터 시스템 구현)

  • Lim, Hyung-Mu;Bae, Sung-Woo;Jung, Myung-Sub;Jang, Byung-Jun;Kim, Jun-O;Park, Jun-Seok;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1049-1054
    • /
    • 2005
  • With the growth of RFID market in logistics industry, such as post office, airline, shipping etc., development of RFID readers and tags becomes crucial. Especially, $860{\sim}960MHz$ RFID is worth noticing because of its long identification range and low production cost. Therefore, performance tests and verification of reader and/or tag under development are very important. In this paper, a RFID emulator system is designed and implemented using a commercial CAD tool, a signal generator and a data acquisition device. With the RFID emulator system, many parameters such as spectrum masks, transmit power levels, data waveform and other RF characteristics can be analyzed. Furthermore it can be applied to the verification of real RFID Readers or Tags.

  • PDF

Performance Analysis of Tag Identification Algorithm in RFID System (RFID 시스템에서의 태그 인식 알고리즘 성능분석)

  • Choi Ho-Seung;Kim Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.5 s.335
    • /
    • pp.47-54
    • /
    • 2005
  • This paper proposes and analyzes a Tag Anti-collision algorithm in RFID system. We mathematically compare the performance of the proposed algorithm with existing binary algorithms(binary search algorithm, slotted binary tree algorithm using time slot, and bit-by-bit binary tree algorithm proposed by Auto-ID center). We also validated analytic results using OPNET simulation. Based on analytic result, comparing the proposed Improved bit-by-bit binary tree algerian with bit-by-bit binary tree algorithm which is the best of existing algorithms, the performance of Improved bit-by-bit binary tree algorithm is about $304\%$ higher when the number of tags is 20, and $839\%$ higher when the number of tags is 200.

Impedance Evaluation Method of UHF RFID Tag Chip for Maximum Read Range (UHF RFID 태그의 최대 인식 거리를 얻기 위한 태그 칩의 임피던스 산출 방법)

  • Sim, Yong-Seog;Yang, Jeen-Mo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.12
    • /
    • pp.1148-1157
    • /
    • 2013
  • In a passive UHF RFID system, the impedance matching between tag antenna and chip as well as the protocol parameter settings in a reader plays important role in determination of the maximum read-range. Almost no paper, however, has dealt with the above issues in relation with the maximum read range. In this paper, two known methods (of using the value from data sheets and proprietary RFID tester) and our proposing method in chip impedance evaluation are compared in terms of maximum read range. The read range of tags whose antenna impedance is conjugate matched with the chip impedance obtained from the proposed method is improved maximum 73 % more than that of tags from the other methods.

API Extension of RTLS Middleware for Efficient Asynchronous Transmission (효율적인 비동기 전송을 지원하기 위한 RTLS 미들웨어의 확장)

  • Park, Jae-Kwan;Hong, Bong-Hee;Lee, Seung-Chul
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.111-118
    • /
    • 2009
  • Recently many global enterprises build RTLS system for their environments. RTLS is used to detect object at real tim e. Unlike RFID, RTLS tags are read automatically and continuously, independent of the process that moves the tags. The proposed functionality of standard API has two problems. When middleware provides data to application, it sends a huge amount of data that may be useless. When only an application requests for data, the middleware replies result data in synchronous mode. This paper proposes a method to reduce an amount of data transferring from middleware to application and an addition communication mode to support real-time event processing in the middleware. Also, we designed and implemented an RTLS middleware applying the proposed methods.

  • PDF

Expressed sequence tags analysis of Blattella germanica

  • CHUNG Hyang Suk;YU Tai Hyun;KIM Bong Jin;KIM Sun Mi;KIM Joo Yeong;YU Hak Sun;Jeong Hae Jin;OCK Mee Sun
    • Parasites, Hosts and Diseases
    • /
    • v.43 no.4 s.136
    • /
    • pp.149-156
    • /
    • 2005
  • Four hundred and sixty five randomly selected clones from a cDNA library of Blattella germanica were partially sequenced and searched using BLAST as a means of analyzing the transcribed sequences of its genome. A total of 363 expressed sequence tags (ESTs) were generated from 465 clones after editing and trimming the vector and ambiguous sequences. About $42\%$ (154/363) of these clones showed significant homology with other data base registered genes. These new B. germanica genes constituted a broad range of transcripts distributed among ribosomal proteins, energy metabolism, allergens, proteases, protease inhibitors, enzymes, translation, cell signaling path-ways, and proteins of unknown function. Eighty clones were not well-matched by database searches, and these rep-resent new B. germanica-specific ESTs. Some genes which drew our attention are discussed. The information obtained increases our understanding of the B. germanica genome.

Generation of Expressed Sequence Tags for Immune Gene Discovery and Marker Development in the Sea Squirt, Halocynthia roretzi

  • Kim, Young-Ok;Cho, Hyun-Kook;Park, Eun-Mi;Nam, Bo-Hye;Hur, Young-Baek;Lee, Sang-Jun;Cheong, Jae-Hun
    • Journal of Microbiology and Biotechnology
    • /
    • v.18 no.9
    • /
    • pp.1510-1517
    • /
    • 2008
  • Expresssed sequence tag (EST) analysis was developed from three cDNA libraries constructed from cells of the digestive tract, gonad, and liver of sea squirt. Randomly selected cDNA clones were partially sequenced to generate a total of 922 ESTs, in which 687 unique ESTs were identified respectively. Results of BLASTX search showed that 612 ESTs (89%) have homology to genes of known function whereas 75 ESTs (11%) were unidentified or novel. Based on the major function of their encoded proteins, the identified clones were classified into ten broad categories. We also identified several kinds of immune-related genes as identifying novel genes. Sequence analysis of ESTs revealed the presence of microsatellite-containing genes that may be valuable for further gene mapping studies. The accumulation of a large number of identified cDNA clones is invaluable for the study of sea squirt genetics and developmental biology. Further studies using cDNA microarrays are needed to identify the differentially expressed transcripts after disease infection.

A RFID Multi-Authentication Method for Logistics Systems (물류 시스템에 적합한 RFID 다중 인증방법)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.313-319
    • /
    • 2009
  • Recently the RFID system, which can recognize multiple tags simultaneously through wireless communication, is emerging as a new technology that can replace the barcode system. Furthermore, related industries are carrying out active research on tags and authentication protocols with guaranteed security that are widely applicable to logistics, distribution, etc. The present study proposes a protocol with enhanced security by introducing the concept of RBAC to the authentication protocol, and a method with lower security for effective mass authentication. The proposed method is advantageous in that it guarantees security against spoofing attack, traffic analysis, replay attack, etc. based on hash function.

Natural language processing techniques for bioinformatics

  • Tsujii, Jun-ichi
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2003.10a
    • /
    • pp.3-3
    • /
    • 2003
  • With biomedical literature expanding so rapidly, there is an urgent need to discover and organize knowledge extracted from texts. Although factual databases contain crucial information the overwhelming amount of new knowledge remains in textual form (e.g. MEDLINE). In addition, new terms are constantly coined as the relationships linking new genes, drugs, proteins etc. As the size of biomedical literature is expanding, more systems are applying a variety of methods to automate the process of knowledge acquisition and management. In my talk, I focus on the project, GENIA, of our group at the University of Tokyo, the objective of which is to construct an information extraction system of protein - protein interaction from abstracts of MEDLINE. The talk includes (1) Techniques we use fDr named entity recognition (1-a) SOHMM (Self-organized HMM) (1-b) Maximum Entropy Model (1-c) Lexicon-based Recognizer (2) Treatment of term variants and acronym finders (3) Event extraction using a full parser (4) Linguistic resources for text mining (GENIA corpus) (4-a) Semantic Tags (4-b) Structural Annotations (4-c) Co-reference tags (4-d) GENIA ontology I will also talk about possible extension of our work that links the findings of molecular biology with clinical findings, and claim that textual based or conceptual based biology would be a viable alternative to system biology that tends to emphasize the role of simulation models in bioinformatics.

  • PDF

Analysis of Expressed Sequence Tags from the Wood-Decaying Fungus Fomitopsis palustris and Identification of Potential Genes Involved in the Decay Process

  • Karim, Nurul;Shibuya, Hajime;Kikuchi, Taisei
    • Journal of Microbiology and Biotechnology
    • /
    • v.21 no.4
    • /
    • pp.347-358
    • /
    • 2011
  • Fomitopsis palustris, a brown-rot basidiomycete, causes the most destructive type of decay in wooden structures. In spite of its great economic importance, very little information is available at the molecular level regarding its complex decay process. To address this, we generated over 3,000 expressed sequence tags (ESTs) from a cDNA library constructed from F. palustris. Clustering of 3,095 high-quality ESTs resulted in a set of 1,403 putative unigenes comprising 485 contigs and 918 singlets. Homology searches based on BlastX analysis revealed that 78% of the F. palustris unigenes had a significant match to proteins deposited in the nonredundant databases. A subset of F. palustris unigenes showed similarity to the carbohydrateactive enzymes (CAZymes), including a range of glycosyl hydrolase (GH) family proteins. Some of these CAZyme-encoded genes were previously undescribed for F. palustris but predicted to have potential roles in biodegradation of wood. Among them, we identified and characterized a gene (FpCel45A) encoding the GH family 45 endoglucanase. Moreover, we also provided functional classification of 473 (34%) of F. palustris unigenes using the Gene Ontology hierarchy. The annotated EST data sets and related analysis may be useful in providing an initial insight into the genetic background of F. palustris.

Personal Identification Based on Radio Signal Strength for Ubiquitous Healthcare Systems

  • Lee, Jong-Shill;Park, Sang-Hae;Chee, Young-Joon;Kim, In-Young;Kim, Sun-I.
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.3
    • /
    • pp.325-331
    • /
    • 2007
  • Personal identification is essential for the automatic measurement of biosignal information in home healthcare systems. Personal identification is usually achieved with passive radio frequency identification (RFID), which does little more than store a unique identification number. However, passive RFID is not ideal for automatic identification. We present a user identification system based on radio signal strength indication (RSSI) using ZigBee for active RFID tags. Personal identification is achieved by finding the largest RSSI value from aggregated beacon messages that are periodically transmitted by active RFID tags carried by users. Obtaining reliable person!'.! identification without restricting the orientation requires a certain distance between the closest active RFID tag from the ZED and the second closest tag. The results show that the closest active RFID tag from the ZED and the second closest tag must be at least 70 cm apart to achieve reliable personal identification.