• Title/Summary/Keyword: 무선식별

Search Result 286, Processing Time 0.02 seconds

Establishment of Data Base for Body Temperature Change in Cattle (소의 일중 체온변화 Data Base 구축에 관한 연구)

  • Jeong, Wang-Yong;Yi, One-Hyeon;Lee, Sang-Cheol;Lee, Sang-Rak
    • Journal of Animal Environmental Science
    • /
    • v.18 no.2
    • /
    • pp.95-98
    • /
    • 2012
  • A normal body temperature data base for cattle was established to utilize for automatic monitoring of abnormal body condition of cattle by using sensor network and radio frequency identification technology. Three castrated Holstein cattle (mean body weight: $318{\pm}12kg$) were employed for body temperature measurement. Animals were adapted at the stanchion barn over 2 weeks, and 4 places (skins of ear, neck, head and subcutaneous tissue of neck) of body temperatures were continuously measured through thermocouples and recorder devices for 9 days. All places of body temperatures were fluctuated throughout the day and showed a cyclic pattern, with higher temperature in day time and lower temperature in nigh time. Normal subcutaneous tissue temperature (core temperature) in a day was ranged from $36.1^{\circ}C$ to $38.2^{\circ}C$. Skin temperatures were varied largely with environmental temperature change. Ear, head and neck temperatures varied with $36.3{\sim}28.5^{\circ}C$, $36.1{\sim}28.0^{\circ}C$ and $35.0{\sim}28.2^{\circ}C$, respectively. In this study, we established a basic data base for normal body temperature in cattle. For more effective data base, it would be needed further study.

Tag Trajectory Generation Scheme for RFID Tag Tracing in Ubiquitous Computing (유비쿼터스 컴퓨팅에서 RFID 태그 추적을 위한 태그 궤적 생성 기법)

  • Kim, Jong-Wan;Oh, Duk-Shin;Kim, Kee-Cheon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.1-10
    • /
    • 2009
  • One of major purposes of a RFID system is to track moving objects using tags attached to the objects. Because a tagged object has both location and time information expressed as the location of the reader, we can index the trajectory of the object like existing spatiotemporal objects. More efficient tracking may be possible if a spatiotemporal trajectory can be formed of a tag, but there has not been much research on tag trajectory indexes. A characteristic that distinguishes tags from existing spatiotemporal objects is that a tag creates a separate trajectory in each reader by entering and then leaving the reader. As a result, there is a trajectory interruption interval between readers, in which the tag cannot be located, and this makes it difficult to track the tag. In addition, the point tags that only enter and don't leave readers do not create trajectories, so cannot be tracked. To solve this problem, we propose a tag trajectory index called TR-tree (tag trajectory R-tree in RFID system) that can track a tag by combining separate trajectories among readers into one trajectory. The results show that TR-tree, which overcomes the trajectory interruption superior performance than TPIR-tree and R-tree.

A Study on Construction of Collision Prevention Algorithm for Small Vessel Using WAVE Communication System (WAVE 통신을 활용한 소형선박의 충돌예방 알고리즘 구축에 관한 연구)

  • Lee, Myoung-ki;Park, Young-Soo;Kang, Won-Sik
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.1
    • /
    • pp.1-8
    • /
    • 2019
  • In December 2017, many collision accidents of small vessels, such as those between oil refineries and fishing boats, occurred near Yeonghung-do in Incheon. In order to prevent marine casualties from small vessels, the government is striving to improve the safety capabilities of ship operators by strengthening education and improving the working environment. They are providing education and refining training regulations for fishermen operating vessels under 5 tons. However, the situation includes certain vulnerabilities. In this study, we propose a collision prevention algorithm for small vessels using the Wireless Access in Vehicular Environments (WAVE) communication system, which is a new communication technique to prevent collisions with small ships. The collision avoidance algorithm used is based on DCPA/TCPA. Research analyses, simulation experiments and questionnaires have been conducted to define the criteria of DCPA/TCPA. As a result, the standard for DCPA was $8(L_a+L_b)$ and for TCPA was 2.5 min. Three different accident cases were selected, and this algorithm was applied to confirm alarm responses at certain times. This algorithm can provide information to the operators of small ships in advance to help them recognize potential collision situations.

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.

Study on AIS-EPIRB Design that Satisfies Revised IMO Performance Requirements (개정된 IMO 요건을 만족하는 AIS-EPIRB 설계에 관한 연구)

  • Chong-Lyong, Pag
    • Journal of Navigation and Port Research
    • /
    • v.48 no.3
    • /
    • pp.137-145
    • /
    • 2024
  • Recently, there has been an increase in the use of Automatic Identification Systems. Class A AIS is used for ships engaged in international voyages, while Class B AIS is utilized for smaller vessels navigating domestic coastlines. AtoN AIS is used for aids to navigation, AIS is employed for search and rescue aircraft, and AIS-SART is widely used worldwide. Accordingly, in 2022, the Maritime Safety Committee(MSC) of the International Maritime Organization(IMO) revised the performance standards for the satellite emergency positioning radio beacon(EP IRB) to include AIS signals along with 121.5 MHz for aircraft, which has been used as a homing signal. It was recommended to use together as a homing signal, and from July 1, 2022, it was decided that AIS-EP IRB that satisfies the revised performance standards will replace the existing EP IRB. Consequently, starting from July 1, 2022, it was decided that AIS-EPIRB, which meets the revised performance standards, will replace the existing EP IRB. This paper aims to verify the feasibility of implementing AIS-EPIRB, which has not yet been developed domestically. To achieve this, a dedicated chipset for AIS was used to additionally implement frequency generation of 161.975 MHz and 162.025 MHz and GMSK modulation to satisfy the requirements.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF