• Title/Summary/Keyword: Tags

Search Result 1,307, Processing Time 0.026 seconds

Analyses of RFID Security Framework and Protocol Supporting Internet of Things (사물 인터넷망을 위한 RFID 보안 프레임워크와 프로토콜 분석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.373-374
    • /
    • 2014
  • Radio frequency identification system (RFID) is an automatic technology and aids machines or computers to identify objects, record metadata or control individual target through radio waves. Connecting RFID reader to the terminal of Internet, the readers can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IoT). RFID is often seen as a prerequisite for the IoT. This paper introduces amd surveyed the technologies of RFID and IoT, discusses the applications and challenges of RFID technology used in IoT.

  • PDF

RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Bashir, Salman
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.166-177
    • /
    • 2019
  • Radio Frequency Identification (RFID) skill is becoming a technology that might deliver a response to manual glitches. The use of tags, receiver and wireless surfs to join with each other would mean that RFID in combination with the EPC would speech these pain opinions and offer many welfares in different sectors such as production, distribution, trade, logistics, and security. Potential benefits include increased visibility rising supply chain, enlarged proficiency and cost savings through improved data harmonization, better responsiveness to actual prominence change. Trendy the case of the textile or industrial applications, recent systems used by the industry to control the supply chain in addition strength discernibility are being studied, besides improvements in the overall perceptibility of assets are anticipated through labels, readers, drivers, POEs, etc. this model will be developed with new situations and a lively construction industry. It will be focused on Cost, Hardware compatibility, security and maintenance issues.

The Study for Establishment of Security Threat Measures for Secure NFC Service (안전한 NFC 서비스 활용 활성화를 위한 보안 위협 대책 마련을 위한 고찰)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.219-228
    • /
    • 2018
  • The utilization of NFC has been continuously increasing due to the spread of smart phones and the development of short-range wireless communication networks. However, it has been suggested that stability and security of convenient NFC short-range wireless communications can be unstable and problematic. The unstable causes for NFC are the lack of security technologies for NFC, the controversy about personal information infringement, and the lack of social awareness on security breach against data settlement. NFC service can be conveniently used by simply touching other NFC devices and NFC tags through the NFC device. This thesis analyzes that NFC authentication technology, which is convenient for user are one of the unstable causes of security of NFC. This thesis suggest that ministry should research countermeasures and promote how users can use NFC safely. It also suggests that users should have awareness when they use payment and authentication service through NFC to prevent from security threat.

Analyses of RFID Application and Its Security Problems Embedded in Internet of Things(IoT) (사물 인터넷망에서의 RFID 응용 기술 및 보안 문제 분석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.473-474
    • /
    • 2014
  • Radio frequency identification system (RFID) is an automatic technology and aids machines or computers to identify objects, record metadata or control individual target through wireless waves. Connecting RFID reader to the terminal of Internet, the readers can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IOT). RFID is often seen as a prerequisite for the IOT. This paper surveys the technologies of RFID and IOT, discusses the applications and challenges of RFID technology used in IoT.

  • PDF

An Analysis of KoreaMed MeSH Check Tags (KoreaMed MeSH 체크태그 분석)

  • Jeong, So-Na;Lee, Choon Shil
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 2013.08a
    • /
    • pp.105-111
    • /
    • 2013
  • KoreaMed MeSH 반자동 색인 시스템이 논문 제목, 초록 그리고 저자키워드를 활용하여 부여한 KoreaMed MeSH 체크태그와 NLM의 MeSH 색인전문가가 부여한 MEDLINE MeSH 체크태그와의 일치여부를 비교 분석하였다. KoreaMed 학술지중에서 MEDLINE에 등재된 15종 학술지의 2012년 마지막 호에 실린 논문 236편을 표본으로 선정하여 일치도를 분석한 결과 MEDLINE MeSH 체크태그와 KoreaMed MeSH 체크태그와의 일치율은 30.24%였다. 그러나 KoreaMed MeSH 체크태그를 기준으로 했을 경우 MEDLINE MeSH 체크태그와의 일치율은 84.24%에 달했다. 일치율은 종별이 가장 높았고, 동물명, 성별, 연령그룹순이었다. 연령그룹에 대하여 초록내 패턴을 발견하여 반자동색인 필터로 적용한다면 일치율을 높일 수 있다. 궁극적으로는 연구의 핵심적인 연구대상이나 재료를 특정적이고 구체적인 단어 혹은 MeSH로 표현하는 초록 작성 기술이 요청된다.

  • PDF

A Design of the Platform Technology for the Smart Shopping Mall Using NFC: A Software Engineering Approach

  • Je, Seung-Mo;Seo, Kyungryong
    • Journal of Multimedia Information System
    • /
    • v.6 no.1
    • /
    • pp.43-48
    • /
    • 2019
  • An IoT-based server system for store management was developed in this study. Its client-server structure having a product categorization function allows the system to read the NFC tags attached to individual products and provides information about them to customers automatically. The system also provides an effective promotional effect as it not only offers necessary information about the items the customers are seeking but also displays the advertisements related to them. This server system was designed specifically designed for the use in a smart shopping Mall or a department store so that the store owners can manage their sales operation more effectively while their customers enjoy shopping more conveniently. It is expected that the technology used for this IoT-utilized server system can be one of the efficient and effective platform technologies in the current and future store management systems.

Towards Effective Entity Extraction of Scientific Documents using Discriminative Linguistic Features

  • Hwang, Sangwon;Hong, Jang-Eui;Nam, Young-Kwang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1639-1658
    • /
    • 2019
  • Named entity recognition (NER) is an important technique for improving the performance of data mining and big data analytics. In previous studies, NER systems have been employed to identify named-entities using statistical methods based on prior information or linguistic features; however, such methods are limited in that they are unable to recognize unregistered or unlearned objects. In this paper, a method is proposed to extract objects, such as technologies, theories, or person names, by analyzing the collocation relationship between certain words that simultaneously appear around specific words in the abstracts of academic journals. The method is executed as follows. First, the data is preprocessed using data cleaning and sentence detection to separate the text into single sentences. Then, part-of-speech (POS) tagging is applied to the individual sentences. After this, the appearance and collocation information of the other POS tags is analyzed, excluding the entity candidates, such as nouns. Finally, an entity recognition model is created based on analyzing and classifying the information in the sentences.

Collided Tag Signals' Periodic Characteristic based RFID Tag Collision Detection Method

  • Yang, Wan-Seung;Park, Hyung-Chul
    • Journal of IKEEE
    • /
    • v.25 no.1
    • /
    • pp.32-36
    • /
    • 2021
  • This paper presents a novel collided tag signals's periodic characteristic based radio frequency identification (RFID) tag collision detection method for the ultra high frequency (UHF) RFID. The proposed method utilizes that periodicity of tag signals is maintained even under tag collision. In the proposed method, the correlation between received signal and reference edge signal is used. Simulation result shows that the detection performance using the proposed method is about 10 dB better than that of existing method. In addition, the detection performances with different magnitude difference, phase difference, delay, number of tags are analyzed.

A Method to Protect the Information of Tag Using Forced Collision Mechanism in RFID System (RFID 시스템에서 강제 충돌을 이용한 태그 정보 보호 기법)

  • Park Ju-Sung;Kang Jeonil;Nyang Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.25-33
    • /
    • 2005
  • We propose a method to protect the tag's information from illegal reader in RFID system. In this method, a special tag called ownership tag makes intentionally collisions during singulation. By the forced collision of an ownership tag a reader can obtain the information of ordinary tags. Whereas a reader can not find my information on tag's ID without the ownership tag.

Implementation of UWB Indoor Positioning and Real-time Remote Control System for Disaster Monitoring based on Digital Twin (재난 감시 디지털 트윈을 위한 UWB 실내 측위 및 실시간 원격제어 시스템 구현)

  • Yu, Da-Song;Kim, Won-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.12
    • /
    • pp.1682-1692
    • /
    • 2021
  • Digital Twin, one of the core technologies of the Fourth Industrial Revolution, is attracting attention as a very suitable technology for disaster monitoring such as fires and earthquakes. In this paper, we implement a system equipped with UWB RTLS(Ultra-Wideband Real Time Location System), real-time remote control, and video streaming, which are element technologies for disaster monitoring digital twin. Since the proposed system structure is based on a cloud server, the actual location of the UWB indoor positioning-based client is transmitted to the user device in real time and stored on the cloud server for statistical and data analysis. In addition, we demonstrate through experiments that outliers occurs when the value of RSSI(Received Signal Strength Indicator) decreases due to communication collisions between UWB Tags, and propose an RSSI outlier correction algorithm to solve this problem.