DOI QR코드

DOI QR Code

Design of Tourism Application Based on RFID Technology

  • Lee, JiHyun (School of Electrical and Computer Engineering, Korea University) ;
  • Lee, JoonGoo (School of Electrical and Computer Engineering, Korea University) ;
  • Kim, SeonWook (School of Electrical and Computer Engineering, Korea University)
  • Received : 2013.11.20
  • Accepted : 2014.02.12
  • Published : 2014.04.30

Abstract

Automatic identification is pervasive in many areas and its applicable areas are increasing gradually. 2D bar-code, NFC, and RFID technologies are representative examples of the automatic identification. This paper explains the implementation of mobile tourism application software on RFID technology. The mobile application provides the location and navigation information by combining the tag inventory and web database. The interactions among the user, application and database server are described in detail. This paper proposes a simple way of minimizing the efforts to build the entire system by storing the URLs for the tag and accessing existing tourism information services through the URLs.

Keywords

References

  1. X. Zhu, S. K. Mukhopadhyay, and H. Kurata, "A Review of RFID Technology and Its Managerial Applications in Different Industries," Journal of Engineering and Technology Management, vol. 29, no. 1, pp. 152-167, 2012. https://doi.org/10.1016/j.jengtecman.2011.09.011
  2. T.-W. Kan, C.-H. Teng, and M. Y. Chen, "QR Code Based Augmented Reality Applications," in Handbook of Augmented Reality. Springer, pp. 339-354, 2011.
  3. T. Sun and D. Zhou, "Automatic Identification Technology-Application of Two-dimensional Code," in Automation and Logistics (ICAL), 2011 IEEE International Conference on. IEEE, pp. 164-168, 2011.
  4. T. J. Soon, "QR Code," Synthesis Journal, pp. 59-78, 2008.
  5. R. Want, "An Introduction to RFID Technology," Pervasive Computing, IEEE, vol. 5, no. 1, pp. 25-33, 2006. https://doi.org/10.1109/MPRV.2006.2
  6. C. M. Roberts, "Radio Frequency Identification (RFID)," Computers& Security, vol. 25, no. 1, pp. 18-26, 2006. https://doi.org/10.1016/j.cose.2005.12.003
  7. B. Nath, F. Reynolds, and R. Want, "RFID Technology and Applications," IEEE Pervasive Computing, vol. 5, no. 1, pp. 22-24, 2006. https://doi.org/10.1109/MPRV.2006.13
  8. J. Ondrus and Y. Pigneur, "An Assessment of NFC for Future Mobile Payment Systems," in Management of Mobile Business, 2007. ICMB 2007. International Conference on the. IEEE, pp. 43-43, 2007.
  9. M. Fisher, "Conducting an Online Payment Transaction Using an NFC Enabled Mobile Communication Device,"US Patent 8,352,323, Jan. 8 2013.
  10. G. Madlmayr, J. Langer, C. Kantner, and J. Scharinger, "NFC Devices: Security and Privacy," in Availability, Reliability and Security, 2008. ARES 08. Third International Conference on. IEEE, pp. 642-647, 2008.
  11. J. Haartsen, "Bluetooth-The Universal Radio Interface for Ad Hoc, Wireless Connectivity," Ericsson review, vol. 3, no. 1, pp. 110-117, 1998.
  12. K. Hozak, "Managerial Guidance for Applying RFID in The Tourism Industry," Interdisciplinary Journal of Contemporary Research in Business, vol. 4, no. 2, pp. 18-30, 2012.
  13. F. Borrego-Jaraba, I. Luque Ruiz, and M. A. G'omez-Nieto, "A NFC-based Pervasive Solution for City Touristic Surfing," Personal Ubiquitous Comput., vol. 15, no. 7, pp. 731-742, Oct. 2011. https://doi.org/10.1007/s00779-010-0364-y
  14. J. Pesonen and E. Horster, "Near Field Communication Technology in Tourism," Tourism Management Perspectives, vol. 4, pp. 11-18, 2012. https://doi.org/10.1016/j.tmp.2012.04.001
  15. B. Ozdenizci, K. Ok, V. Coskun, and M. Aydin, "Development of an Indoor Navigation System Using NFC Technology," in Information and Computing (ICIC), 2011 Fourth International Conference on, pp. 11-14, 2011.
  16. B. Benyo, A. Vilmos, K. Kovacs, and L. Kutor, "NFC Applications and Business Model ofThe Ecosystem," in Mobile and Wireless Communications Summit, 2007. 16th IST. IEEE, pp. 1-5, 2007.
  17. J. J. Gummeson, B. Priyantha, D. Ganesan, D. Thrasher, and P. Zhang, "Engarde: Protecting the Mobile Phone from Malicious NFC Interactions," in Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys '13. New York, NY, USA: ACM, pp. 445-458, 2013.
  18. R. Barthel, K. Leder Mackley, A. Hudson-Smith, A. Karpovich, M. Jode, and C. Speed, "An Internet of Old Things as an Augmented Memory System," Personal Ubiquitous Comput., vol. 17, no. 2, pp. 321-333, Feb. 2013. https://doi.org/10.1007/s00779-011-0496-8
  19. A. Neumann, J. Barnickel, and U. Meyer, "Security and Privacy Implications of URL Shortening Services," in Proceedings of the Workshop on Web, vol. 2, 2011.
  20. F. Klien and M. Strohmaier, "Short Links Under Attack: Geographical Analysis of Spam in a URL Shortener Network," in Proceedings of the 23rd ACM conference on Hypertext and social media. ACM, pp. 83-88, 2012.
  21. D. Guinard, C. Floerkemeier, and S. Sarma, "Cloud Computing, REST and Mashups to Simplify RFID Application Development and Deployment," in Proceedings of the Second International Workshop on Web of Things. ACM, p. 9, 2011.