• Title/Summary/Keyword: smart RFID tag

Search Result 77, Processing Time 0.03 seconds

A Study of Smart Healthcare Services Software Quality Satisfaction Rating System based on QoS(Quality of Service) Measurement Model (QoS(Quality of Service) 측정 모델을 참조한 스마트헬스케어서비스 소프트웨어 품질만족도 평가체계)

  • Noh, Si-Choon;Song, Eun-Jee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.149-154
    • /
    • 2014
  • Quality is the value that can be measured by observing the characteristics of the service quantity or quality. QoS is predictable service traffic to a minimum requirements what passed in network. In the course of Smart Medical Information System Development there exist some functional requirements to satisfy quality objectives. The functional smart domains of healthcare information systems consists of Patient Module, a smart sensing and communication domain, RFID Tag Readers and the behavior domain, Homecare Station Domain, Clinical Station. This study is performed on evaluation methodology of u-health service satisfaction quality of each domain. In this paper QoS metrics and the quality of medical information requirements, functional requirements are separated by. Quality parameters consists of six items and the functional requirements and quality requirements 20 details the five items and consist of 20 detailed items. On this study the quality evaluation methodology of Korean smart health information quality assessment matrix 2 - factor evaluation method is proposed. The overall framework of this paper is organizing the specific criteria of quality of medical information system and modeling quality evaluation process under all smart environment.

A Study on the Design of Automatic Billing Information Systems for Long-Term Home Care Services Business Using iBeacon (iBeacon을 활용하는 장기요양 재가 서비스 업무를 위한 자동청구 정보시스템의 설계에 관한 연구)

  • Jung, Sung Hwa;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.3
    • /
    • pp.612-619
    • /
    • 2016
  • Applying evolved IT technology to increase the satisfaction of the consumer is a typical feature of the rapidly transformed service industry. Smart devices have taken a place as the mainstream of major media, moreover, IT service strategies utilizing smart devices have been constantly developed. Location recognition method of users has been proposed as one of the significant features to the IT service industry. The long-term care home services can be one example of user location recognition methods that real time computerization of service record utilize an attached tag to home of pensioners with RFID reader or an NFC function of mobile when a home carer provides service. And, the Homecare Electronics Management System (HEMS) and the various location recognition methods will be discussed to improve effectiveness of services. In this paper, we propose a home applicable electronic management system which insurer, home care service facilities, home cares, pensioners and guardians which enables to simultaneously check service records based on the improved system by use of iBeacon.

pH equation model of RFID-pH sensor using fermented foods (RFID-pH 센서를 이용한 발효식품의 pH 모델식)

  • Lee, Chang Won;Kim, Joo Woong;Son, Dong Sul;Eom, Ki-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.849-852
    • /
    • 2013
  • These fermented food has been increased interest to people's health in recent years. Factors which have taste, storability and trophism of fermented food is affected food of material, temperature, humidity and pH. But fermented food has yet not been established of model equation for the change in pH. If they that seller and consumer can know the status and quality, customer could increase credibility and consumption-oriented about fermented foods. In this paper, we obtain model equation through measured PH of fermented foods. So, model equation is offered platform about maturity of fermented foods. In order to confirm the usefulness of the proposed model equation, we tested the change in PH about a kimchi and a rice wine which is fermented food of Korea representative.

  • PDF

A Reliable Data Capture in Multi-Reader RFID Environments (다중 태그 인식 기반의 신뢰성 있는 데이터 수집 환경)

  • Lee, Young-Ran
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.9
    • /
    • pp.4133-4137
    • /
    • 2011
  • Reliable Multi-Reader RFID identification is one of issues in Multi-Reader RFID realization program in recent. And the Multi-Reader RFID reader has difficulty to obtain reliable data in data capture layer. The reason is that unreliable readings such as a false positive reading and a false negative reading and missed readings can happen by reader collision problems, noise, or the mobility of tagged objects. We introduce performance metrics to solve these reader problems. We propose three solutions the Minimum Overlapped Read Zone (MORZ) with Received Signal Strength Indicator (RSSI), the Spatial-Temporal Division Access (STDA) method, and double bigger size of tags attached on the object. To show the improvement of the proposed methods, we calculate tag's successful read rates in a smart office, which consists of Multi-Reader RFID systems.

The Study of Smart Navigation System development for blind people based on Cortex-A8 Platform include Digital Zoom (Digital Zoom기능을 포함한 Cortex-A8 Platform 기반의 시각장애인용 Smart Navigation System개발에 관한 연구)

  • Han, Seung-Hwan;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.289-292
    • /
    • 2012
  • Presently, there is the blind of about 20~300,00 people including didn't register in Korea Usually, they used white stick when they walk outside. There is the blind receiving the help of the guide dog but a small number of blind uses due to many composite problems including the cost problem, and etc. Presently, the guidance service aid long for the blind which is commonly used adheres the RFID tag to the white stick. It remains at the level of the extent of making the cover block and RF communication by using this. The recognition distance is short. This is the actual condition in which it is difficult to determine the location of the clear obstacle and size and form, it doesn't become the help which is actually big in the walk of the blinds. Thus, in this paper, the investigation of 'Smart Portable Navigation System' development of the Cortex-A8 Platform base tries to be handled so that the blinds can walk easily.

  • PDF

Development of NFC Mobile Application for Information on Textile Materials (패션소재 정보 전달을 위한 NFC 모바일 어플리케이션 개발)

  • Park, Sohyun;Kim, Jongjun
    • Journal of Fashion Business
    • /
    • v.20 no.1
    • /
    • pp.142-156
    • /
    • 2016
  • Convergence of IT devices and fashion is enabling the industry to take fully different approaches in various areas including product planning, fabric selecting, distributing, and marketing. At the same time, it also transforms the definition of clothing itself. Convergence of IT technologies in the realm of fashion and textiles industries can create a powerful synergy through connection digital devices, such as mobile phone. In this context, this study attempts to suggest how IT technology can be efficiently harnessed through the usage of mobile devices in the planning stage of fashion materials, where the initial production plan of a clothing item is mapped out. This study ultimately aims to enhance the effectiveness of databases on fashion material information by using mobile devices to utilize NFC, an RFID technology having as much revolutionary power as Internet - which can be the convergence between IT and fashion across the software dimensions. To pursue this research, data on fashion material information regarding 200 woven fabric specimens were provided by textile companies. The information includes elements such as its composition, weight, width, yarn, density and sales report. These pieces of information were organized into a database. Drawing on this data, Android-based applications that allow smart phones to read off fabric information from NFC tags were developed for this study using two methods. The system works as follows: 1. NFC tag stickers are attached onto the hangers where 200 fabric samples are hanging. 2. The NFC tag stickers are tagged, or read off from a smart phone that support NFC functions. 3. Upon tagging, the Smart phone swiftly displays all information available on its screen - not only the aforementioned six elements, but also the image of the clothing item from the fabric in its finalized product form, and the video of the model wearing the item - for convenient view. The method harbors immense potential for the fashion industry in general, and will also be useful in those fields inside the industry that harness NFC technology.

Development of a ICT Convergence Business Model based on Smart Phone (스마트 폰 기반의 ICT 융합 비즈니스 모델 개발)

  • Park, Young-Jae
    • Journal of Digital Convergence
    • /
    • v.13 no.6
    • /
    • pp.81-89
    • /
    • 2015
  • Recently, according to rapid technological development trend of mobile devices revolutionary transforming our lives in various fields, thereby combining the latest in communications technology. These mobile devices to celebrate the digital convergence era are now created a new business model due to mobility. The mobile business operators obtains a user's location information using the smart phone. The mobile business operators provide users with the area or building-related information for the user on. The mobile business operators provide users profiles to advertisers and product sellers. In this study, I propose the mobile business model and that there are no technical problems design a conceptual framework on mobile agents for mobile operators.

Development of IoT-based real-time Toxic Chemical management System (IoT 기반의 실시간 유해 화학물 관리 시스템 개발)

  • Kang, Min-Soo;Ihm, Chunhwa;Jung, Yong-Gyu;Lee, Minho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.143-149
    • /
    • 2016
  • Recent accidents caused by toxic chemicals and the social problems caused by frequent. As of 2010, there are more than 100,000 types of deadly toxic chemicals being distributed throughout Korea, and severely intoxicated patients along with an enormous number of patients can be induced at the time of an accident involving deadly toxic chemicals. Internationally, the seriousness of large-scale disasters due to a NBC disaster (nuclear, biologic and chemical disaster) is being highlighted as well. So, we obtain the information of the RFID tag attached to a glass bottle with containing the toxic chemical to transfer the data to the smart device has been studied a system that can monitor the status of the toxic chemical in real time. The proposed system is the information was sent to the main system using a zigbee communication by recognizing the tag vial containing the toxic chemical with the 13.56MHz bandwidths good permeability. User may check the information in real time by utilizing the smart device. However, the error of the system for managing the toxic chemical generates a result that can not be predicted. Failure of the system was detecting the error by using a comparator as this can cause an error. And the detected error proposed a duplex system so that they do not affect the overall system.

Implemention of Refrigerator Application using NFC (NFC를 이용한 냉장고 Application 구현)

  • Ham, Ji-Hun;Yun, Min-Gyu;Han, Jung-Woo;Kim, Tae Yong;Jang, Won-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.570-572
    • /
    • 2015
  • NFC (Near Field Communication) is an area of the RFID technology is a kind of short-range wireless communication. NFC technology is to utilize the data transfer, the access control system is usefully employed in many fields, such as mobile payment. Recently smartphone application development using NFC is activated, recognition of the convenience of the current NFC tag is insignificant state. In this paper, it is the content of the Application that was created in order to provide the knowledge of convenience food to the customer to visit the mart. Users with Mart, using smartphones, at a NFC tag that is attached to the food display stand food information, purchasing tips, keeping method, data such efficacy is provided over the screen of the smartphone. If you purchased the food is placed in the refrigerator "moves to the food list of application to click the button, through the food list screen their food list in the refrigerator, and by providing information such as expiration date, the user There is help me to be able to buy the more convenient food.

  • PDF

A Light-Weight RFID Distance Bounding Protocol (경량 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.307-314
    • /
    • 2010
  • Recently, it is proved that contactless smart-card based RFID tags, which is used for proximity authentication, are vulnerable to relay attacks with various location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Moreover, distance bounding protocols have been researched to prevent these relay attacks that can measure the message transmitted round-trip time between the reader and the tag. In 2005, Hancke and Kuhn first proposed an RFID distance bounding protocol based on secure hash function. However, the Hancke-Kuhn protocol cannot completely prevent the relay attacks because an adversary has (3/4)$^n$ attack success probability. Thus, this paper proposes a new distance-bounding protocol for light-weight RFID systems that can reduce to (5/8)$^n$ for the adversary's attack success probability. As a result, the proposed protocol not only can provide high-space efficient based on a secure hash function and XOR operation, but also can provide strong security against the relay attacks because the adversary's attack success probability is optimized to (5/8)$^n$.