• Title/Summary/Keyword: 바코드시스템

Search Result 256, Processing Time 0.022 seconds

Smart Cart System for Commodity Browsing and Automatic Calculation (물품검색과 자동계산이 가능한 스마트카트 시스템)

  • Park, Cha-Hun;Hwang, Seong-Hun;Choi, Geon-Woo;Park, Jae-Hwi;Lee, Seung-Hyun;Kim, Sung-Hyeon;Jung, Ui-Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.669-670
    • /
    • 2020
  • 현재 4차 산업이 진행됨으로써 대부분의 사물들이 자율화 기능이 더해지는 시대가 오고 있다. 자율화 기술이 발전됨으로써 모든 사람들은 삶을 살아가면서 스스로 문제를 해결해 나갈수 있으며 기존의 생활속도보다 빨라지는 것을 느낄수 있을 것이다. 그래서 마트에서도 쇼핑을하면서 소비자들이 어떻게 쇼핑을 할 때 현재의 수준보다 쇼핑의 질이 높아 질지 고안해보았다. 본 과제물은 소비자들이 쇼핑을할 때 보다 편리하게 일을 처리할수도록 스마트 기능을 카트와 카운터에 추가하였다. 카트에 디스플레이와 바코드 스캐너를 부착함으로써 검색을 통해 소비자들이 원하는 물품의 가격, 위치등의 정보를 알아 낼 수 있고 현재 카트에 담긴 물품의 총 가격을 알 수 있다. 또한, 쇼핑을 마치고 계산을할 때 계산 대기줄이 길어지는 불편함을 해소하기위해 자동계산 기능이 있다. 쇼핑을 마친 소비자가 카트를 카운터로 끌고가면 카트에 저장되어 있는 쇼핑정보가 카운터의 디스플레이에 표시되고 카트와 카운터의 정보가 일치한다면 소비자가 카트에 요금을 충전해 스스로 계산을 수행할수 있다. 이런 자동화, 스마트 기능들은 소비자들의 편리함과 시간을 단축시킬수 있을 것이다.

  • PDF

Forward Security Protection Protocol of RFID System using New Key Generation Method (새로운 키 생성 방법을 통한 RFID시스템의 전방위보안성 보호 프로토콜)

  • Cho Jung-Hwan;Cho Jung-Sik;Yeo Sang-Soo;Kim Sung kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.19-21
    • /
    • 2005
  • 현대의 산업화 사회에서는 자동인식을 통해서 사람과 사물을 식별하고자 하는 연구들이 진행되고 있다. 그 대표적인 예로 바코드를 이용한 접촉식 판별기술이 있고, 라디오 주파수를 이용한 RFID(Radio Frequency Identification) 기술을 들 수 있다. RFID의 경우는 무선 주파수를 이용하기 때문에 대량의 사물을 동시에 인식 할 수 있다는 장점이 있다. 하지만. 어떠한 상황에서 리더의 요청에 응답을 하는 리더-태그 시스템이기 때문에 사용자의 프라이버시 침해 문제를 야기 할 수 있다. 사용자의 프라이버시 침해문제를 막기 위해서 많은 연구들이 진행되고 있다. 그 중에서, Miyako Ohkubo의 Hash체인을 이용한 프라이버시 보호 기법은 정보유출, 위치추적공격(Location Tracking Attack), 전방위보안성(Forward Security)과 같은 프라이버시 침해문제들로부터 사용자의 프라이버시를 보호 할 수 있는 프로토콜이다. 그러나 Hash함수를 태그에 구현하는 것은 현재까지는 불가능한 상황이다. 또, Martin Feldhofer의 AES(Advanced Encryption Standard)를 사용한 프로토콜은 실제로 태그에 구현 가능하면서 내부구조가 8bit인 AES를 사용함으로써 암호학적인 강도를 높였으나, 프라이버시 침해 문제에서 단점을 드러냈다. 이러한 단점을 보완한 AES기반에서의 개선된 RFID 프라이버시 보호 프로토콜은 실제적으로 태그에 구현 가능한 AES를 이용한 암호화 체인을 통해서 프라이버시 보호에 우수하면서 실제 사용이 가능한 프로토콜을 제안하였다[1]. 그러나, 이 프로토콜은 생성되는 키 값들이 물리적 공격을 통해서 노출이 되었을 때, 이전의 seed값과 키 값들이 노출 되는 단점이 있다. 본 논문에서는 이러한 문제들을 해결하고자 프라이버시보호에 새로운 키 생성 방법을 통한 강력한 프로토콜을 제안 한다.하였으나 사료효율은 증진시켰으며, 후자(사양, 사료)와의 상호작용은 나타나지 않았다. 이상의 결과는 거세비육돈에서 1) androgen과 estrogen은 공히 자발적인 사료섭취와 등지방 침적을 억제하고 IGF-I 분비를 증가시키며, 2) 성선스테로이드호르몬의 이 같은 성장에 미치는 효과의 일부는 IGF-I을 통해 매개될 수도 있을을 시사한다. 약 $70 {\~} 90\%$의 phenoxyethanol이 유상에 존재하였다. 또한, 미생물에 대한 항균력도 phenoxyethanol이 수상에 많이 존재할수록 증가하는 경향을 나타내었다. 따라서, 제형 내 oil tomposition을 변화시킴으로써 phenoxyethanol의 사용량을 줄일 수 있을 뿐만 아니라, 피부 투과를 감소시켜 보다 피부 자극이 적은 저자극 방부시스템 개발이 가능하리라 보여 진다. 첨가하여 제조한 curd yoghurt는 저장성과 관능적인 면에서 우수한 상품적 가치가 인정되는 새로운 기능성 신제품의 개발에 기여할 수 있을 것으로 사료되었다. 여자의 경우 0.8이상이 되어서 심혈관계 질환의 위험 범위에 속하는 수준이었다. 삼두근의 두겹 두께는 남녀 각각 $20.2\pm8.58cm,\;22.2\pm4.40mm$으로 남녀간에 유의한 차이는 없었다. 조사대상자의 식습관 상태는 전체 대상자의 $84.4\%$가 대부분이 하루 세끼 식사를 규칙적으로 하고 있었으며 식사속도는 허겁지겁 빨리 섭취하는 경우가 남자는 $31.0\%$, 여자는 $21.4\%$로 나타났고 이들을 제외한 나머지 사람들은 보통 속도 혹은 충분한 시간을 가지고 식사를 하였다. 평소 식사량은 조금 적게 혹은 적당하게 섭취하는 사람이 대부분이었으며 남자가 여자보다는 배부르게 먹는 경 향이 유의적으로 높았다(p<0.05). 식사는 혼자 하는 경우가 남자

  • PDF

Identification and Chromosomal Reshuffling Patterns of Soybean Cultivars Bred in Gangwon-do using 202 InDel Markers Specific to Variation Blocks (변이영역 특이 202개 InDel 마커를 이용한 강원도 육성 콩 품종의 판별 및 염색체 재조합 양상 구명)

  • Sohn, Hwang-Bae;Song, Yun-Ho;Kim, Su-Jeong;Hong, Su-Young;Kim, Ki-Deog;Koo, Bon-Cheol;Kim, Yul-Ho
    • Korean Journal of Breeding Science
    • /
    • v.50 no.4
    • /
    • pp.396-405
    • /
    • 2018
  • The areas of soybean (Glycine max (L.) Merrill) cultivation in Gangwon-do have increased due to the growing demand for well-being foods. The soybean barcode system is a useful tool for cultivar identification and diversity analysis, which could be used in the seed production system for soybean cultivars. We genotyped cultivars using 202 insertion and deletion (InDel) markers specific to dense variation blocks (dVBs), and examined their ability to identify cultivars and analyze diversity by comparison to the database in the soybean barcode system. The genetic homology of "Cheonga," "Gichan," "Daewang," "Haesal," and "Gangil" to the 147 accessions was lower than 81.2%, demonstrating that these barcodes have potentiality in cultivar identification. Diversity analysis of one hundred and fifty-three soybean cultivars revealed four subgroups and one admixture (major allele frequency <0.6). Among the accessions, "Heugcheong," "Hoban," and "Cheonga" were included in subgroup 1 and "Gichan," "Daewang," "Haesal," and "Gangil" in the admixture. The genetic regions of subgroups 3 and 4 in the admixture were reshuffled for early maturity and environmental tolerance, respectively, suggesting that soybean accessions with new dVB types should be developed to improve the value of soybean products to the end user. These results indicated that the two-dimensional barcodes of soybean cultivars enable not only genetic identification, but also management of genetic resources through diversity analysis.

Fabrication and characteristics of TiO2 coating solution with silica-based inorganic binder (실리카 베이스 무기 바인더 기반의 TiO2 코팅액의 제조 및 특성 평가)

  • Kang, Woo-kyu;Kim, Hye-Jin;Kim, Jin-Ho;Hwang, Kwang-Taek;Jang, Gun-Eik
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.29 no.2
    • /
    • pp.71-76
    • /
    • 2019
  • Recently, the demand of labels for product management is increasing, as the automation system becomes more common. the development of functional labels which can be used in various environments has been rapidly proceeded. In the case of a printed circuit board, barcode labels with thermal and chemical stability are generally used due to a high temperature process around $300^{\circ}C$ and chemical cleaning in the manufacturing process. However, the yellowing phenomenon of labels that can lower the resolution of printed barcode image still needs to be prevented. In this study, we prepared a composite coating layer using a silica inorganic binder and a titanium dioxide white pigment, and developed a functional labels with thermal and chemical stability. The silica inorganic binder prepared by sol-gel process was confirmed to show excellent adhesion and abrasion resistance with the polyimide film. The white coating layer could be formed on the polyimide film with mixing the silica inorganic binder and titanium dioxide white pigment. The prepared coating layer showed excellent whiteness and glossiness above $400^{\circ}C$. The excellent chemical stability of the coating layer was also confirmed by the chemical treatment with acidic (pH 1.6) and basic (pH 13.6) cleaners.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.