• Title/Summary/Keyword: Wireless identification system

Search Result 206, Processing Time 0.028 seconds

Development of an Acoustic-Based Underwater Image Transmission System

  • Choi, Young-Cheol;Lim, Yong-Kon;Park, Jong-Won;Kim, Sea-Monn;Kim, Seung-Geun;Kim, Sang-Tae
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2003.05a
    • /
    • pp.109-114
    • /
    • 2003
  • Wireless communication systems are inevitable for efficient underwater activities. Because of the poor propagation characteristics of light and electromagnetic waves, acoustic waves are generally used for the underwater wireless communication. Although there are many kinds of information type, visual images take an essential role especially for search and identification activities. For this reason, we developed an acoustic-based underwater image transmission system under a dual use technology project supported by MOCIE (Ministry of Commerce, Industry and Energy). For the application to complicated and time-varying underwater environments all-digital transmitter and receiver systems are investigated. Array acoustic transducers are used at the receiver, which have the center frequency of 32kHz and the bandwidth of 4kHz. To improve transmission speed and quality, various algorithms and systems are used. The system design techniques will be discussed in detail including image compression/ decompression system, adaptive beam- forming, fast RLS adaptive equalizer, ${\partial}/4$ QPSK (Quadrilateral Phase Shift Keying) modulator/demodulator, and convolution coding/ Viterbi. Decoding.

  • PDF

Robust Audio Fingerprinting Method Using Prominent Peak Pair Based on Modulated Complex Lapped Transform

  • Kim, Hyoung-Gook;Kim, Jin Young
    • ETRI Journal
    • /
    • v.36 no.6
    • /
    • pp.999-1007
    • /
    • 2014
  • The robustness of an audio fingerprinting system in an actual noisy environment is a major challenge for audio-based content identification. This paper proposes a high-performance audio fingerprint extraction method for use in portable consumer devices. In the proposed method, a salient audio peak-pair fingerprint, based on a modulated complex lapped transform, improves the accuracy of the audio fingerprinting system in actual noisy environments with low computational complexity. Experimental results confirm that the proposed method is quite robust in different noise conditions and achieves promising preliminary accuracy results.

A Study of Mobile Patient Identification System Using EM4095 (EM4095를 이용한 모바일 의료환자인식 시스템 연구)

  • Jo, Heung-Kuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2337-2342
    • /
    • 2010
  • There is a vast field of application for RFID(Radio Frequency IDentification) technology. In the case of hospitals, RFID can be used for organizing patient data. Generally, patient data has been handled with medical cards. In order to look up data about a patient, the medical card would have to be found first, within a lot of other medical cards, by hand or with a computer. This is a very inconvenient system. Also, if the card is searched by the name of the patient, fatal medical accidents may occur in cases of mix-ups. If remote RFID Tag monitoring systems are applied in this case, the patient data would be accessible in the hospital. This article will discuss the grafting of RFID systems and wireless data communicating technology. The EM4095 chip, which uses 125KHz carrier waves was used in this study. And a Bluetooth module was added for wireless data communication. The ATMEGA128 microcomputer was used to control the RFID system and wireless module. A LCD monitor was connected to the extension port for nurses to view patient data, and also, the same information was displayed on PC monitors for doctors to see. The circuit was designed to consume minimal amounts of electricity for portability, and to transmit Tag ID's in environments with a lot of noise. The article is concluded with a diagram of the whole system, and performance of each data transmitting section has been analyzed.

A Management Method for Personal Purchases in Mobile RFID System (개인 물품 관리 지원 모바일 RFID 시스템)

  • Kim, Tae-Sung;Sohn, Kyung-Ho;Yoon, Kang-Jin;Kim, Young-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.296-301
    • /
    • 2010
  • Radio frequency identification(RFID) system can identify an object using wireless transmission. RFID applications are numerous and far reaching. The most interesting and widely used applications are supply chain management for companies. Currently, RFID tags must be detached or killed for security and privacy reasons when tagged objects are purchased. In this paper, we present a new architecture that transfers information about products from the electronic product code information services (EPCIS) server of a company to an individual's personal purchases management (PPM) server when products with RFID codes are sold. It solves the security and privacy issues without detaching the tag. Moreover, the PPM server described in this paper allows customers to handle the expiration dates, updates, location management, and group management of products.

An Certification and a Location Tracing Protect Model on RFID (RFID 시스템에서의 인증 및 위치추적 방지 모델)

  • Kim, Jin-Mook;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.33-43
    • /
    • 2006
  • RFID System has an advantage that it need not touch an objects for identification of many objects. Because it is working through wireless communication. Also, So many objects can be identified with RFID System at once. However, although RFID System has convenience like above, it has serious privacy concern at the same time. If RFID System is working with an target object through wireless communication, other objects will respond to RFID System signal as well as a target object. Hence, RFID System can be easily exposed user privacy by attacker. In this paper, We propose RFID system authentication model in order to protecting user privacy and traking. Proposed RFID system is operating that not only server authenticate RFID reader but also RFID reader and tag authenticate mutually by using symetric cryptography that operating with tiny and simple processing.

  • PDF

A Wireless Sensor Network Systems to Identify User and Detect Location Transition for Smart Home (지능형 주택을 위한 구성원 식별 및 위치 이동 감지 센서 네트워크 시스템)

  • Lee, Seon-Woo;Yang, Seung-Yong
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.396-402
    • /
    • 2010
  • The tracking of current location of residents is an essential requirement for context-aware service of smart houses. This paper presents a wireless sensor network system which could detect location transition such as entrance and exit to a room and also identify the user who passed the room, without duty of wearing any sort of tag. We designed new sensor node to solve the problem of short operation lifetime of previous work[1] which has two pyroelectric infrared (PIR) sensors and an ultrasonic sensor, as well as a 2.4 GHz radio frequency wireless transceiver. The proposed user identification method is to discriminate a person based on his/her height by using an ultrasonic sensor. The detection idea of entering/exiting behavior is based on order of triggering of two PIR sensors. The topology of the developed wireless sensor network system is simple star structure in which each sensor node is connected to one sink node directly. We evaluated the proposed sensing system with a set of experiments for three subjects in a model house. The experimental result shows that the averaged recognition rate of user identification is 81.3% for three persons. and perfect entering/exiting behavior detection performance.

Intelligent Video Event Detection System Used by Image Object Identification Technique (영상 객체인식기법을 활용한 지능형 영상검지 시스템)

  • Jung, Sang-Jin;Kim, Jeong-Jung;Lee, Dong-Yeong;Jo, Sung-Jea;Kim, Guk-Boh
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.2
    • /
    • pp.171-178
    • /
    • 2010
  • The surveillance system in general, has been sufficiently studied in the field of wireless semiconductor using basic sensors and its study of image surveillance system mainly using camera as a sensor has especially been fully implemented. In this paper, we propose 'Intelligent Image Detection System' used by image object identification technique based on the result analysis of various researches. This 'Intelligent Image Detection System' can easily trace and judge before and after a particular incident and ensure affirmative evidence and numerous relative information. Therefore, the 'Intelligent Image Detection System' proposed in this paper can be effectively used in the lived society such as traffic management, disaster alarm system and etc.

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.

Development of Tele-image Processing Algorithm for Automatic Harvesting of House Melon (하우스멜론 수확자동화를 위한 원격영상 처리알고리즘 개발)

  • Kim, S.C.;Im, D.H.;Chung, S.C.;Hwang, H.
    • Journal of Biosystems Engineering
    • /
    • v.33 no.3
    • /
    • pp.196-203
    • /
    • 2008
  • Hybrid robust image processing algorithm to extract visual features of melon during the cultivation was developed based on a wireless tele-operative interface. Features of a melon such as size and shape including position were crucial to successful task automation and future development of cultivation data base. An algorithm was developed based on the concept of hybrid decision-making which shares a task between the computer and the operator utilizing man-computer interactive interface. A hybrid decision-making system was composed of three modules such as wireless image transmission, task specification and identification, and man-computer interface modules. Computing burden and the instability of the image processing results caused by the variation of illumination and the complexity of the environment caused by the irregular stem and shapes of leaves and shades were overcome using the proposed algorithm. With utilizing operator's teaching via LCD touch screen of the display monitor, the complexity and instability of the melon identification process has been avoided. Hough transform was modified for the image obtained from the locally specified window to extract the geometric shape and position of the melon. It took less than 200 milliseconds processing time.

EPC C1 Gen2 RFID System with Channel Coding (채널 부호를 적용한 EPC C1 Gen2 RFID 시스템)

  • Jeon, Ki-Yong;Cho, Sung-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2A
    • /
    • pp.174-182
    • /
    • 2008
  • For the UHF EPC C1 Gen2 RFID system, to overcome the performance degradation in wireless channel environments, we proposed a modified tag structure which supports channel coding and its applied methodology. The reader consistently monitors the wireless channel status and sets to use channel coding functions for tags and reader only if wireless channel is corrupted. Compared with previous tag complexity, only negligible gates are needed to implement channel coding. By simulation we showed an obvious performance improvement of the identification reliability.