• Title/Summary/Keyword: 수동형

Search Result 457, Processing Time 0.029 seconds

ISO 18000-6 Type C 수동형 RFID 시스템을 위한 태그 및 리더 충돌방지 알고리즘

  • Song, In-Chan;Hong, Seong-Hyeon;Jang, Gyeong-Hui;Lee, Hyeong-Seop
    • Information and Communications Magazine
    • /
    • v.25 no.10
    • /
    • pp.7-17
    • /
    • 2008
  • RFID 시스템은 유통물류 분야를 비롯해 다양한 분야에서 활용되고 있지만, RFID 시스템에서의 태그 및 리더 충돌로 인해 태그의 인식효율 및 인식속도의 감소가 RFID시스템의 확산에 걸림돌이 되고 있다. 본고에서는 RFID 시스템의 효율을 높이기 위한 태그 및 리더 충돌방지 알고리즘들을 소개한다. 특히, ISO 18000-6 Type C 수동형 RFID 시스템에서의 태그 및 리더 충돌방지 알고리즘에 대하여 집중적으로 알아본다.

Design and Implementation of UHF RFID Reader System Supporting Sensor Data Processing (센서 데이터 처리를 지원하는 UHF RFID 리더 시스템의 설계 및 구현)

  • Shin, Dong-Beom;Lee, Heyung-Sub;Choi, Gil-Young;Kim, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12A
    • /
    • pp.925-932
    • /
    • 2009
  • Precise temperature monitoring is the major preconditioning to supervise quality losses within the transport chain for fresh products. ISO/IEC18000-6REV1 defines new protocols supporting BAP(Battery Assisted Passive) RFID tag which is completely compatible with EPCglobal Class1 Generation2 specification. In this paper, we designed a modem supporting BAP RFID tag with FPGA(Field Programmable Gate Array) and implemented sensor data processing function defined in ISO/IEC18000-6REV1. The transmit block of the modem supports pulse shaping filter and the output signal of the implemented RFID reader is satisfied with the spectrum mask defined in the standard. The receive block of the modem uses Gardner TED to synchronize timing of symbol. In this paper, we designed a modem supporting ISO/IEC18000-6REV1 standard and developed a RFID reader sndard. The developed RFID reader sndard can recognize sensor tag and passive tag in the wireless environment and supports real-time processing of the sensor data in the embedded linux platform.

Optimal Design of Contending-type MAC Scheme for Wireless Passive Sensor Networks (무선 수동형 센서 망을 위한 경합형 MAC 방식의 최적 설계)

  • Choi, Cheon Won;Seo, Heewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.6
    • /
    • pp.29-36
    • /
    • 2016
  • A wireless passive sensor network is a network which, by letting separate RF sources supply energy to sensor nodes, is able to live an eternal life without batteries. Against expectations about an eternal life, however, a wireless passive sensor network still has many problems; scarcity of energy, non-simultaneity of energy reception and data transmission and inefficiency in resource allocation. In this paper, we focus on a wireless passive sensor network providing a packet service which is tolerable to packet losses but requires timely delivery of packets. Perceiving the practical constraints, we then consider a contending-type MAC scheme, rooted in framed and slotted ALOHA, for supporting many sensor nodes to deliver packets to a sink node. Next, we investigate the network-wide throughput achieved by the MAC scheme when the packets transmitted by geographically scattered sensor nodes experience path losses hence capture phenomena. Especially, we derive an exact formula of network-wide throughput in a closed form when 2 sensor nodes reside in the network. By controlling design parameters, we finally optimize the contending-type MAC scheme as to attain the maximum network-wide throughput.

Modeling and Analysis of Active Mounting System for a Plate-Type Structure (플레이트 형태의 구조물에 대한 능동 마운팅 시스템의 모델링 및 해석)

  • Hong, Dongwoo;Kim, Byeongil
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.41 no.10
    • /
    • pp.915-921
    • /
    • 2017
  • Recently, studies to reduce vibration and noise of automobiles have been actively conducted. However, previous studies did not concentrate on the optimization of the mount system with passive or active mounts. This study analytically studies an active mounting system with three active structural paths between source and receiver and the feasibility has been verified. Active mounting system has a coupled structure of piezoelectric stack actuators and passive mounts. A dynamic model of the whole system is prepared and the control force and phase of the stack actuators in each path are determined to target full isolation of each path. Its performance on vibration attenuation is investigated and based on it, optimized combinations of passive and active paths for the best attenuation are presented.

Efficient Replication Protocols for Mobile Agent Systems (이동 에이전트 시스템을 위한 효율적인 중복 프로토콜)

  • Ahn, Jin-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.12
    • /
    • pp.907-917
    • /
    • 2006
  • In this paper, we propose a strategy to improve fault-tolerance and scalability of replicated services in mobile agent systems by applying an appropriate passive replication protocol for each replicated service according to whether the service is deterministic or non-deterministic. For this purpose, two passive replication protocols, PRPNS and PRPDS, are designed for non-deterministic and deterministic services respectively. They both allow visiting mobile agents to be forwarded to and execute their tasks on any node performing a service agent, not necessarily the primary agent. Especially, in the protocol PRPDS, after a backup service agent has received each mobile agent request and obtained its delivery sequence number from the primary service agent, the backup is responsible for processing the request and coordinating with the other replica service agents. Therefore, our strategy using the two proposed protocols can promise high scalability of replicated services a large number of mobile agents attempt to access in mobile agent systems. Our simulation results show that the proposed strategy performs much better than the one using only the traditional passive replication protocol.

Real-time passive millimeter wave image segmentation for concealed object detection (은닉 물체 검출을 위한 실시간 수동형 밀리미터파 영상 분할)

  • Lee, Dong-Su;Yeom, Seok-Won;Lee, Mun-Kyo;Jung, Sang-Won;Chang, Yu-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.181-187
    • /
    • 2012
  • Millimeter wave (MMW) readily penetrates fabrics, thus it can be used to detect objects concealed under clothing. A passive MMW imaging system can operate as a stand-off type sensor that scans people in both indoors and outdoors. However, because of the diffraction limit and low signal level, the imaging system often suffers from low image quality. Therefore, suitable statistical analysis and computational processing would be required for automatic analysis of the images. In this paper, a real-time concealed object detection is addressed by means of the multi-level segmentation. The histogram of the image is modeled with a Gaussian mixture distribution, and hidden object areas are segmented by a multi-level scheme involving $k$-means, the expectation-maximization algorithm, and a decision rule. The complete algorithm has been implemented in C++ environments on a standard computer for a real-time process. Experimental and simulation results confirm that the implemented system can achieve the real-time detection of concealed objects.

Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems (UHF 수동형 RFID 시스템에 적합한 경량 고속의 보안 프로토콜 설계 및 구현)

  • Kang, You-Sung;Choi, Yong-Je;Choi, Doo-Ho;Lee, Sang-Yeoun;Lee, Heyung-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.117-134
    • /
    • 2010
  • A passive RFID tag which received attention as a future technology for automatic and quick identification faces some difficulties about security problems such as tag authentication, reader authentication, data protection, and untraceability in addition to cost and reliable identification. A representative passive RFID technology is the ISO/IEC 18000-6 Type C which is an international standard for 900 MHz UHF-band. This standard has some difficulties in applying to the security services such as originality verification, tag's internal information protection, and untraceability, because it does not provide high-level security solution. In this paper, we summarize security requirements of ISO/IEC ITC 1/SC 31 international standardization group, propose security protocols suitable for the UHF-band passive RFID system using a crypto engine, and analyze its security strength. In addition, we verify that it is possible to implement a tag conforming with the proposed security protocols by presenting concrete command/response pairs and cryptographic method.

System Development for Tracking a UHF Passive RF1D Tag in an Outpatient Clinic (외래병원 환경에서 UHF 수동형 RFID 기술을 활용한 태그 추적 시스템 개발)

  • Min, Dai-Ki
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.3
    • /
    • pp.113-127
    • /
    • 2011
  • An RFID system has been widely applied in many areas over the initial SCM application. In the literature enormous RFID applications in healthcare are documented to improve patient safety, patient/provider logistics, and the efficiency of collecting data. Based on the proposed 4-layered RFID system architecture, we introduce a case that implemented an UHF passive RFID-based tracking system in an outpatient clinic. Particularly, we propose a method to process RFID data that contains noise and missing reads. The proposed method for processing unreliable RFID data is capable to locate the tag accurately and provide additional business information. We finally conclude the paper with identifying obstacles and what is necessary to ensure system reliability.