• Title/Summary/Keyword: radio frequency identification (RFID)

Search Result 766, Processing Time 0.027 seconds

Design of Ubiquitous Payment Process for Enhancing Seamlessness and Privacy (연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계)

  • Lee, Kyoung Jun;Jeong, Mu Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.3
    • /
    • pp.1-13
    • /
    • 2006
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. Payment, however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, strong personal device, and peer-based information transactions. We also propose U-SDT Protocol integrating technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF

Implementation of reliable transmission technique in jamming environment (방해전파 환경에서 신뢰성을 확보한 효과적 전송기법 구현)

  • Hwang, Seong-kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2279-2284
    • /
    • 2017
  • Recent wireless communications using the unlicensed band have been on the rise and the range of use is increasing. The license-exempted band is a prerequisite for accepting interference between telecommunication equipment. In particular, the interference phenomenon of Bluetooth, wireless LAN, and RFID (Radio Frequency Identification) using the 2.4 GHz band is getting serious. In such urban areas, the wireless transmission medium may be in a bad state. There are roughly two ways to make effective transmission in this environment. The first is the IEEE 802.11 RTS / CTS method and the second is the frame fragmentation method. In this paper, it is difficult to transmit a frame over a certain size in a jamming environment due to the interference of the wireless environment. In this environment, we implement a frame division transmission scheme that guarantees effective transmission and reliability by dividing a frame into smaller units in order to perform reliability transmission and efficient transmission.

Analyses of the Effect of Inserting Border Lines between Adjacent Color Regions on Detecting Boundaries (경계선 검출에 대한 인접 칼라 영역간 테두리 선 삽입 효과의 분석)

  • Yoo, Hyeon-Joong;Kim, Woo-Sung;Jang, Young-Beom
    • Journal of IKEEE
    • /
    • v.10 no.1 s.18
    • /
    • pp.87-95
    • /
    • 2006
  • This paper presents the analyses of the effect of inserting border lines between different color regions on edge detection in color codes, and is not intended to present any new algorithm for color-code recognition. With its role to complement the RFID (radio frequency identification) and the wide and fast spread of digital cameras, an interest on color codes is fast increasing. However, the severe distortion of colors in obtained images prohibits color codes from expanding their applications. To reduce the effect of color distortion it is desirable to process the whole pixels in each color region statistically, instead of relying on some pixels sampled from the region. This requires segmentation, and the segmentation usually requires edge detection. To help detect edges not disconnected, we inserted border lines of the width of two pixels between adjacent color regions. Two colors were used for the border lines: one consisting of white pixels, and the other black pixels. The edge detection was performed on images with either of the two kinds of border lines inserted, and the results were compared to results without inserted border lines. We found that inserting black border lines degraded edge detection by causing zipper effect while inserting white border lines improved it compared to the cases without inserted border lines.

  • PDF

The Design of Automated System for Ubiquitous Healthcare Examination (유비쿼터스 기반의 건강진단 자동화 시스템의 설계)

  • Kung, Sang-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.3
    • /
    • pp.541-548
    • /
    • 2007
  • The workflow, one of core features for modern business operation, models common elements and their relationships in business processes. The research is focused on how to adapt the workflow model to the healthcare examination which becomes popular these days. Especially, we intend to have fully automated process for healthcare examination by providing customers with PDA with RFTD chip. In order to realize this goal, this paper proposes the design of software architectures the class structures, and the definition of messages used for the system interactions. In other word, the paper shows the analysis of healthcare application in terms of service scenario and the design of workflow engine ant ubiquitous healthcare application under the Object-Oriented programming environment. the The result of the study may also enable the unmanned healthcare examination as well as ubiquitous based healcare examination sooner or later.

  • PDF

A Study on IoT Service for Game Development (게임 개발을 위한 IoT 서비스)

  • Lee, MyounJae
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.291-297
    • /
    • 2015
  • The basic idea of IoT(Internet of Things) is interconnection and cooperation with a variety of things in real life such as Radio-Frequency Identification(RFID) tags, sensors, mobile phone, etc, through internet. IoT technologies which applied to these fields consist of sensor network technology and middleware, application. Currently, IoT technology is applied to various fields such as health care, home care, automotive, transportation, construction, agriculture, environment, food, and etc, based on its technologies. This paper focuses on discussion of the IoT development trend in game field. In order to achieve this purpose, first, the IoT technologies for game development based on sensor network technology and middleware, application is mentioned. Second, covers serious game and gamification that is expected to be a growing that is expected to be a growing, by applying IoT technologies to the game field. It can help for game developers by using IoT technologies.

Performance Modeling of an EPC Information Service System

  • Kim, So-Jung;Kang, Yong-Shin;Son, Kyung-Won;Lee, Yong-Han;Rhee, Jong-Tae;Hong, Sung-Jo
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.3
    • /
    • pp.285-293
    • /
    • 2010
  • To obtain visible and traceable information from the supply chain, HW/SW standards for the EPC global network, which process electronic product code (EPC) data read from Radio frequency identification (RFID) tags, are regarded as the de facto industry standard. Supply chain participants install information service systems and provide logistics information to partners by following the EPCglobal architecture framework. Although quality of service (QoS) is essential for providing dependable and scalable services as pointed out by Auto-ID Lab, only a few models for the performance analysis of QoS-related work have been developed in the context of EPC information service systems. Specifically, doing so allows alternative design choices to be tested in an easy and cost-effective manner and can highlight potential performance problems in designs long before any construction costs are incurred. Thus, in this study we construct a model of an EPC information service system for the purposes of performance analysis and designing a dependable system. We also develop a set of building blocks for analytical performance models. To illustrate how the model works, we determine the characteristics of an EPC information service system and then select a combination of these proven modeling concepts. We construct a performance model that considers the response time and shows how to derive meaningful performance values. Finally, we compare the analytical results to measurements of the EPC information service system.

RosettaNet based Business Integration Model for Enhancing Manufacturing Firm's Responsiveness (제조 기업의 대응성 향상을 위한 로제타넷 기반 비즈니스 통합 모델)

  • Park, Mok-Min;Park, Jeong-Ho;Shin, Ki-Tae;Park, Jin-Woo
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.1
    • /
    • pp.89-101
    • /
    • 2010
  • In some industries, manufacturing firms' distinctive competences include not only product superiority but also service excellence. For example, in a highly volatile and dynamic market, flexibility and responsiveness are more valued than just the product cost. And sales order processing, in that respect is a very important process. However, previous studies on sale order processing have considered only due-date assignments or dealt with production scheduling to minimize production cost or delivery lead time. Due to recent advances in information technology, a new approach is possible in dealing with sales order processing. For example, RFID(Radio Frequency IDentification) and ubiquitous computing technology adds real time visibility and traceability to supply chain. In this study, we develop a new due-date re-negotiation process for sales order management and propose a new business integration model to support the re-negotiation process based on RFID, ubiquitous computing technology and RosettaNet's PIPs.

Design of Efficient Adult Authentication Model for prevent of illegal Service of Child in IPTV Service Environment (IPTV 서비스를 이용하는 사용자의 효율적인 성인인증 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.68-75
    • /
    • 2013
  • Recently IPTV that transmits multimedia contents in real time through internet, cable TV net and satelite net gets the limelight. But IPTV service that gives service to users by various media has a problem of not supporting user certification fully. This paper suggests a certification model which prevents getting access permission of IPTV service by sending illegal certification information by adolescent through integrating mobile communication technique with RFID(Radio Frequency IDentification) technique which is a key technique of Ubiquitous environment. This model performs the process of adult certification by keeping synchronization with user's certificaiton information that is saved in data-base of certification server and contents server after getting the system of class categorization in contents server to overcome disadvantage of simple adult certification system that is popular in the existing internet. Also, it adapts double hash chain technique not to down load illegally contents without the permission of manager even if an adolescent gets manager's approval key.

Design and Implementation of Parking Information Support System for Inner Parking Lot Based on Microprocessor (마이크로프로세서 기반의 실내 주차정보 제공 시스템 설계 및 구현)

  • Yoo, Si-On;Oh, Hyoung-Jin;Oh, Kab-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.51-59
    • /
    • 2010
  • Apartment complex, buildings, markets and department stores have inner parking lots which can accept many cars but drivers waste lots of times to find the empty parking spaces in crowding parking lots. In this paper, we proposed the inner parking information support system based on microprocessor which can decrease roaming times to find vacant parking spot in confusing parking lots through notice monitor and provide SMS to make it easy to find parked place. Proposed system consist with RFID system for detecting access of cars, microprocessor system for processing data of checking existence of cars on parking spots and communicating with server, and server system which processes information of cars' in and out, guides empty parking spots and parked location to drivers. Suggested system is realized by handmade model parking lot size of 8 cars, and we confirmed practicality by providing information using parking notice monitor and single message service.

Forward Security Protection Protocol of RFID System using New Key Generation Method (새로운 키 생성 방법을 통한 RFID시스템의 전방위보안성 보호 프로토콜)

  • Cho Jung-Hwan;Cho Jung-Sik;Yeo Sang-Soo;Kim Sung kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.19-21
    • /
    • 2005
  • 현대의 산업화 사회에서는 자동인식을 통해서 사람과 사물을 식별하고자 하는 연구들이 진행되고 있다. 그 대표적인 예로 바코드를 이용한 접촉식 판별기술이 있고, 라디오 주파수를 이용한 RFID(Radio Frequency Identification) 기술을 들 수 있다. RFID의 경우는 무선 주파수를 이용하기 때문에 대량의 사물을 동시에 인식 할 수 있다는 장점이 있다. 하지만. 어떠한 상황에서 리더의 요청에 응답을 하는 리더-태그 시스템이기 때문에 사용자의 프라이버시 침해 문제를 야기 할 수 있다. 사용자의 프라이버시 침해문제를 막기 위해서 많은 연구들이 진행되고 있다. 그 중에서, Miyako Ohkubo의 Hash체인을 이용한 프라이버시 보호 기법은 정보유출, 위치추적공격(Location Tracking Attack), 전방위보안성(Forward Security)과 같은 프라이버시 침해문제들로부터 사용자의 프라이버시를 보호 할 수 있는 프로토콜이다. 그러나 Hash함수를 태그에 구현하는 것은 현재까지는 불가능한 상황이다. 또, Martin Feldhofer의 AES(Advanced Encryption Standard)를 사용한 프로토콜은 실제로 태그에 구현 가능하면서 내부구조가 8bit인 AES를 사용함으로써 암호학적인 강도를 높였으나, 프라이버시 침해 문제에서 단점을 드러냈다. 이러한 단점을 보완한 AES기반에서의 개선된 RFID 프라이버시 보호 프로토콜은 실제적으로 태그에 구현 가능한 AES를 이용한 암호화 체인을 통해서 프라이버시 보호에 우수하면서 실제 사용이 가능한 프로토콜을 제안하였다[1]. 그러나, 이 프로토콜은 생성되는 키 값들이 물리적 공격을 통해서 노출이 되었을 때, 이전의 seed값과 키 값들이 노출 되는 단점이 있다. 본 논문에서는 이러한 문제들을 해결하고자 프라이버시보호에 새로운 키 생성 방법을 통한 강력한 프로토콜을 제안 한다.하였으나 사료효율은 증진시켰으며, 후자(사양, 사료)와의 상호작용은 나타나지 않았다. 이상의 결과는 거세비육돈에서 1) androgen과 estrogen은 공히 자발적인 사료섭취와 등지방 침적을 억제하고 IGF-I 분비를 증가시키며, 2) 성선스테로이드호르몬의 이 같은 성장에 미치는 효과의 일부는 IGF-I을 통해 매개될 수도 있을을 시사한다. 약 $70 {\~} 90\%$의 phenoxyethanol이 유상에 존재하였다. 또한, 미생물에 대한 항균력도 phenoxyethanol이 수상에 많이 존재할수록 증가하는 경향을 나타내었다. 따라서, 제형 내 oil tomposition을 변화시킴으로써 phenoxyethanol의 사용량을 줄일 수 있을 뿐만 아니라, 피부 투과를 감소시켜 보다 피부 자극이 적은 저자극 방부시스템 개발이 가능하리라 보여 진다. 첨가하여 제조한 curd yoghurt는 저장성과 관능적인 면에서 우수한 상품적 가치가 인정되는 새로운 기능성 신제품의 개발에 기여할 수 있을 것으로 사료되었다. 여자의 경우 0.8이상이 되어서 심혈관계 질환의 위험 범위에 속하는 수준이었다. 삼두근의 두겹 두께는 남녀 각각 $20.2\pm8.58cm,\;22.2\pm4.40mm$으로 남녀간에 유의한 차이는 없었다. 조사대상자의 식습관 상태는 전체 대상자의 $84.4\%$가 대부분이 하루 세끼 식사를 규칙적으로 하고 있었으며 식사속도는 허겁지겁 빨리 섭취하는 경우가 남자는 $31.0\%$, 여자는 $21.4\%$로 나타났고 이들을 제외한 나머지 사람들은 보통 속도 혹은 충분한 시간을 가지고 식사를 하였다. 평소 식사량은 조금 적게 혹은 적당하게 섭취하는 사람이 대부분이었으며 남자가 여자보다는 배부르게 먹는 경 향이 유의적으로 높았다(p<0.05). 식사는 혼자 하는 경우가 남자

  • PDF