• Title/Summary/Keyword: Wireless identification system

Search Result 206, Processing Time 0.029 seconds

Design, Development and Testing of the Modular Unmanned Surface Vehicle Platform for Marine Waste Detection

  • Vasilj, Josip;Stancic, Ivo;Grujic, Tamara;Music, Josip
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.195-204
    • /
    • 2017
  • Mobile robots are used for years as a valuable research and educational tool in form of available open-platform designs and Do-It-Yourself kits. Rapid development and costs reduction of Unmanned Air Vehicles (UAV) and ground based mobile robots in recent years allowed researchers to utilize them as an affordable research platform. Despite of recent developments in the area of ground and airborne robotics, only few examples of Unmanned Surface Vehicle (USV) platforms targeted for research purposes can be found. Aim of this paper is to present the development of open-design USV drone with integrated multi-level control hardware architecture. Proposed catamaran - type water surface drone enables direct control over wireless radio link, separate development of algorithms for optimal propulsion control, navigation and communication with the ground-based control station. Whole design is highly modular, where each component can be replaced or modified according to desired task, payload or environmental conditions. Developed USV is planned to be utilized as a part of the system for detection and identification of marine and lake waste. Cameras mounted to the USV would record sea or lake surfaces, and recorded video sequences and images would be processed by state-of-the-art computer vision and machine learning algorithms in order to identify and classify marine and lake waste.

A Study on Prevention of Collision and Data Loss of the RFID System Using a Full-Length Instruction Code Method (무선인식 시스템의 완전 명령 코드 기법을 이용한 데이터 충돌 및 손실 방지에 관한 연구)

  • 강민수;신석균;이재호;박면규;이기서
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.756-765
    • /
    • 2004
  • Using single carrier frequency RFID system in one-to-multiple wireless communications, might be generated data loss because of data collisions. Conventional Anti-collision method prevent data loss from data collisions which are binary tree method and ALOHA. However, those two preventive measures also have week points which are strongly dependent on the time and space when passing through the recognition area. This paper suggests the full-length instruction code method which fits in to half-duplex method, prevents data collision effectively by calculating the non-transmitting time of multiple tags considering approaching time to the recognition area. After full-length instruction code method test using 13.56MHz bandwidth RFID system shows that full-length instruction code method could make better result than any other methods. Moreover, the record shows O(n) result after analyzing O-notation of conventional time-domain procedure.

Design of Diigence/Indolence System using a Smart Phone (스마트폰을 이용한 근태관리시스템의 설계)

  • Jo, Hyun Joon;Lee, Dong Gi;Kim, Min Gyu;Park, Jin Soo;Kim, Dong Hyun;Ban, Chae Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.307-309
    • /
    • 2013
  • Diligence/Indolence records are the basic data at a human resource management and the essential data for measure salaries of employees. However, since the D/I systems using RFIDs or biometric sensors require hish costs to build and operate the D/I systems, it is difficult for to small business or self-employed business to use them. In this paper, we propose the Diligence/Indolence system to use the location identification of a smart phon. To locate the position of an employee, the WiFi signal of a smart phone and the wireless access point are exploited. Because the pre-owned hardware resources are used and initial building costs are low, it is easy for small business to use the proposed D/I system with low cost.

  • PDF

Performance Improvement of a Real-time Traffic Identification System on a Multi-core CPU Environment (멀티 코어 환경에서 실시간 트래픽 분석 시스템 처리속도 향상)

  • Yoon, Sung-Ho;Park, Jun-Sang;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.348-356
    • /
    • 2012
  • The application traffic analysis is getting more and more challenging due to the huge amount of traffic from high-speed network link and variety of applications running on wired and wireless Internet devices. Multi-level combination of various analysis methods is desired to achieve high completeness and accuracy of analysis results for a real-time analysis system, while requires much of processing burden on the contrary. This paper proposes a novel architecture for a real-time traffic analysis system which improves the processing performance on multi-core CPU environment. The main contribution of the proposed architecture is an efficient parallel processing mechanism with multiple threads of various analysis methods. The feasibility of the proposed architecture was proved by implementing and deploying it on our campus network.

Hash based Secure RFID Authentication Protocol for User Privacy Protection (사용자 프라이버시 보호를 위한 해쉬 기반의 안전한 RFID 인증 프로토콜)

  • Lee, Han-Kwon;Cho, Tae-Kyung;Yoo, Hyun-Joong;Park, Byoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.33-40
    • /
    • 2007
  • RFID, a non-contact wireless identification technology is being noticed as a technology to alternate barcode system in distribution industry and general industry. Despite of merit of RFID, there are issues to be solved for practical use. One of them, which are most important, is resolution of user's information protection. RFID system without security function bears risk exposing personal data and user's privacy. In this paper, we propose mutual authentication protocol for RFID system in order to solve this security issue. This study aimed to protect user's privacy by providing dynamic ID for tag through authentication protocol safe from security threats. Information being transmitted between backend, reader and tag has no direct connection with ID of tag, and it conducts authentication process using one-way hash function, which prevents attacker's obtaining of tag information using information being transmitted.

  • PDF

Real-time Water Supply Facilities Monitoring System based on the USN (USN 기반의 실시간 수도설비 모니터링 시스템)

  • Kim, Yong-Tae;Yoo, Neung-Hwan;Park, Gil-Cheol;Kim, Seok-Soo;Kim, Tai-Hoon;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1207-1213
    • /
    • 2007
  • This paper has researched water supply facilities management using real-time water utility monitoring system based on USN(Ubiquitous Sensor Network) which is consisted of wireless sensors transferring waterworks facilities md treatment information about a valve-room and flowmeter-room of water supply installation. In the manholes, it was installed with flowmeter, pressure sensors, vibration sensors, Co-sensors, and hydro-thermograph sensors. These measurement values which are received by PDA are used for facilities operation on the spot safely and conveniently. It has also provided safe installation management via CDMA(Code Division Multiple Access) network which transfers data to remote servers to monitoring at a distance place. With safety management system of water supply facilities on USN technology convenience and safety is increased in real situation, and it is expected that we can supply clean water to people as much safer and more effective water supply installation management.

Development of a Work Environment Monitoring System for Improving HSE and Production Information Management Within a Shipyard Based on Wireless Communication (무선 통신 기반 조선소 내 HSE 및 생산정보 관리 향상을 위한 작업환경 모니터링 시스템 개발)

  • Chunsik Shim;Jaeseon Yum;Kangho Kim;Daseul Jeong;Hwanseok Gim;Donggeon Kim;Donghyun Lee;Yerin Cho;Byeonghwa Kim
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.60 no.5
    • /
    • pp.367-374
    • /
    • 2023
  • As the Fourth Industrial Revolution accelerating, countries worldwide are developing technologies to digitize and automate various industrial sectors. Building smart factories not only reduces costs through improved process productivity but also allows for preemptive identification and removal of risk factors through the practice of Health, Safety, and Environment (HSE) management, thereby reducing industrial accident risks. In this study, we visualized pressure, temperature, power, and wind speed data measured in real-time via a monitoring GUI, enabling field managers and workers to easily access related information. Through the work environment monitoring system developed in this study, it is possible to conduct economic analysis on per-unit basis, based on the digitization of production management elements and the tracking of required resources. By implementing HSE in shipyards, potential risk factors can be improved, and gas and electrical leaks can be identified, which are expected to reduce production costs.

A Study of applying Method of Unipolar-ZCD Spreading Code for LED-ID in Interference Environment (LED-ID용 간섭채널환경하에서의 단극형 ZCD확산코드 적용 기법에 관한 연구)

  • Cha, Jae-Sang;Kim, Jin-Young;Jang, Yeong-Min;Kim, Jong-Tae;Lee, Kyong-Gun;Moon, Kyung-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.275-280
    • /
    • 2010
  • Recently, This paper suggests that LED-ID technique applying positioning method for LED light. also, Authors in this paper has launched this investigation earnestly. However, there are various interferences such as MPI(Multi Path Interference) by reflected waves of the surface and interfere factors by their correlation properties of the ID in LED-ID wireless channel. Therefore, in this paper, we propose a novel OOK(On-Off Keying)-CDMA(Code Division Multiple Access) system using unipolar ZCD(Zero Correlation Duration) spreading code and verify the availability of the proposed system via the evaluation performance simulation.

A study on enhanced M-ary QT algorithm using collision bits position in RFID system (RFID 시스템에서 충돌비트 위치를 이용한 M-ary QT 알고리즘 향상에 관한 연구)

  • Kim, Kwan-Woong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.109-117
    • /
    • 2016
  • The most important mission of RFID reader is identify EPC (Electronic Product Code) of RFID tag of products that located within distinguishable range of RFID reader. RFID reader transmits query message to RFID tags through wireless channel and RFID tags send unique EPC to response its query message simultaneously. therefore tag collision occurred frequently. RFID tags collision resolution algorithm required to apply RFID technology to various industries. In this paper, we propose enhanced M-ary algorithm that collision bits location is used by not only RFID reader but also tags. the main feature of the proposed algorithm is that integrate multiple query message of M-ary QT algorithm to the single query message by analyze multiple response messages from tags. the simulation results show that the proposed algorithm give better performance than M-ary QT algorithm in terms of the number of query-response, identification efficiency and communication overhead.

Personalizing Web Service Pages for Mobile Users (모바일 사용자를 위한 웹 서비스 페이지 개인화 기법)

  • Jeon Yeonghyo;Hwang Eejun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.1
    • /
    • pp.69-80
    • /
    • 2005
  • Recent popularity of web-ready mobile devices such as PDA and cellphone has made mobile Internet access very popular. However, most of existing Web contents and services are optimized for desktop computing environment and not well suited for mobile devices. Considering different system features of mobile devices such as small display and limited input capability, an alternative scheme to access the Web efficiently is required. On the other hand, personalization plays an important role in the tailored access to the Web contents and services. In this paper, we propose a proxy- based personalization scheme of Web service pages for mobile users. For that purpose, in addition to log data. service related features of Web pages are considered for the correct identification of popular services. It automatically provides mobile users with the tailored list of Web services well suited for diverse mobile devices. Consequently, mobile users can utilize customized Web services with minimum navigation on the mobile devices with limited capability. In order to show its effectiveness, we have performed several experiments on the prototype system and reported some of the results.