• Title/Summary/Keyword: Active tag

Search Result 165, Processing Time 0.021 seconds

A hand-off mechanism of mobile nodes in a location positioning system based on ZigBee tags

  • Eun, Seong Bae;Chae, Yi Geun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.2
    • /
    • pp.175-181
    • /
    • 2014
  • Location awareness is one of the key functions to build an U-city. Recently, many of works for the location-aware systems are emerging to be applied to on-going large-scale apartment complex. For example, when dwellers or cars with active tags are move in the apartment complex, the active tags broadcast their own identifiers periodically and receivers such that routers use this information to calculate the location of the active tags. Since the active tags can actually move between routers and coordinators, it requires a hand-off mechanism. In this paper, we investigate the hand-off problem occurred in location awareness system based on ZigBee active tags. We propose and analyze a new approach for handling the hand-off problem. Through a mathematical analysis, we show that our approach diminishes the quantity of packet transfer than ZigBee's approach.

Expression of Active Antibacterial Bumblebee Abaecin in Escherichia coli Cells

  • Kim, Seong-Ryul;Hwang, Jae-Sam;Yoon, Hyung-Joo;Park, Kwan-Ho;Hong, Mee-Yeon;Kim, Kee-Young;Jin, Byung-Rae;Kim, Ik-Soo
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.17 no.1
    • /
    • pp.137-141
    • /
    • 2008
  • We previously isolated and cloned a cDNA of abaecin from the Bombus ignitus. In an effort to produce a large amount of soluble abaecin at low cost, we successfully expressed the peptide in Escherichia coli that are highly sensitive to its mature form. For this, we fused the peptide encoding 39 amino acids of mature B. ignitus abaecin to the thioredoxin gene together with a C-terminal 6xHis tag. An enterokinase cleavage site was introduced between the 6xHis tag and mature abaecin to allow final release of the recombinant peptide. A high yield of 9.6 mg soluble fusion protein from 200 ml of bacterial culture was purified by $Ni^{2+}$-charged His-Bind resin affinity column, and 1.4 mg of pure active recombinant abaecin was readily obtained by enterokinase cleavage, followed by affinity chromatograph. The molecular mass of recombinant abaecin peptide was determined by Tricin-SDS-PAGE analysis. The recombinant abaecin exhibited antibacterial activity against Gram-negative bacteria.

Development of facial recognition application for automation logging of emotion log (감정로그 자동화 기록을 위한 표정인식 어플리케이션 개발)

  • Shin, Seong-Yoon;Kang, Sun-Kyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.737-743
    • /
    • 2017
  • The intelligent life-log system proposed in this paper is intended to identify and record a myriad of everyday life information as to the occurrence of various events based on when, where, with whom, what and how, that is, a wide variety of contextual information involving person, scene, ages, emotion, relation, state, location, moving route, etc. with a unique tag on each piece of such information and to allow users to get a quick and easy access to such information. Context awareness generates and classifies information on a tag unit basis using the auto-tagging technology and biometrics recognition technology and builds a situation information database. In this paper, we developed an active modeling method and an application that recognizes expressionless and smile expressions using lip lines to automatically record emotion information.

Multi-hop RFID Reader and Tag Communication Architecture for Port Logistics (항만 물류용 RFID 리더-태그 간 다중 홉 통신 구조)

  • Yoo, Young-Hwan;Kim, Jin-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.532-541
    • /
    • 2009
  • The RFID technology has attracted much attention these days due to the far better efficiency than the bar-code and magnetic card system. As an important usage, the 433 MHz active RFID tag was already adopted to the container ports in the United States and Europe for container loading/unloading automation and equipment location. However, there is one problem to be solved for the complete automation. RFID readers support only the direct communication with tags within their RF communication range. Then there are a lot of containers and equipments such as crane, yard tractor, and forklift in ports; and because they are made of metal, they interfere the RF communication, resulting in the occurrence of the dead-zone. In the dead-zone, RFID tags cannot receive any signal from readers. There may be several solutions to resolve the dead-zone problem. Among them, this paper suggests the most economical solution where RFID tags in the dead-zone can communicate with readers via neighbor tags in the multi-hop manner The new RFID communication architecture should be carefully designed in order to maintain the compatibility with the previous standard. Our experiment shows that the proposed architecture works well even in the case where some tags are out of the RF range of reader.

Improved cryptanalysis of lightweight RFID mutual authentication Protocols LMAP, $M^2AP$, EMAP (경량 RFID 상호인증 프로토콜 LMAP, $M^2AP$, EMAP에 대한 향상된 취약성 분석)

  • Kwon, Dae-Sung;Lee, Joo-Young;Koo, Bon-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.103-113
    • /
    • 2007
  • In this paper, we present a security analysis of Lightweight RFID Mutual Authentication Protocols-LMAP[10], $M^2AP$[11], EMAP[12]. Based on simple logic operations, the protocols were designed to be suitable for lightweight environments such as RFID systems. In [8,9], it is shown that these protocols are vulnerable to do-synchronization attacks with a high probability. The authors also presented an active attack that partially reveals a tag's secret values including its ID. In this paper, we point out an error from [9] and show that their do-synchronization attack would always succeed. We also improve the active attack in [9] to show an adversary can compute a tag's ID as well as certain secret keys in a deterministic way. As for $M^2AP$ and EMAP, we show that eavesdropping $2{\sim}3$ consecutive sessions is sufficient to reveal a tag's essential secret values including its ID that allows for tracing, do-synchronization and/or subsequent impersonations.

Feasibility Research of the Active RFIDs for the Smart Occupancy Detection (지능형 재실 감지 서비스를 위한 능동형 RFID의 적용 타당성 연구)

  • Choi, Yeon-Suk;Park, Byoung-Tae
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.2
    • /
    • pp.147-155
    • /
    • 2011
  • For an effective energy management in intelligent buildings it is necessary to gather information about position/absence of people and the level of population. In this paper the smart occupancy detection system based on the active RFID is developed to satisfy such a demand. The performance of the developed system is tested and verified through various experiments. Furthermore the feasibility test of the active RFID tag is performed to verify whether it can be used as a location-based occupancy sensor. The developed core technology can be also applied to other fields such as security, healthcare, smart home, etc.

A Design of Security Protocol for Active Warehouse Condition Management System based on Ubiquitous Environment (유비쿼터스 환경에능동형 창고 상태관리를 위한 보안 프로토콜 설계)

  • John, Young-Jun;Choi, Yong-Sik;Shin, Seung-Ho;Park, Sang-Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.6
    • /
    • pp.91-108
    • /
    • 2006
  • RFID/USN is important infrastructure of the ubiquitous society. And so, It is various and practical research is attempted. These two base technology have physical characteristic and complement relationship. Like this relationship is applied Following example that is system research which manages warehouse stocks and conditions. First, We adhere RFID Tag at the Pallet of the warehouse and do identification goods. And then, It grasps the environment state information of stocks with sensor module which has Zigbee wireless communication function. From like this process RFID Tag information and jop-control command of sensor node also it is exposed to air. Therefore, We control sensor node in USN/RFID environment through the mobile device. And system design for the security Apply of the process is main purpose of this paper's. We propose the condition and function of the mobile device to the secondary. And We define the relation of the sensor node with RFID to be arranged to a warehouse. Finally, This paper is designed to find a trade-off of the following viewpoints. First, We offer suitable sensor-control information to a actual manager. Second, We offer RFID tag security approach to control the action of the sensor. Third, It increases the survivability of sensor node form.

Personalized Bookmark Search Word Recommendation System based on Tag Keyword using Collaborative Filtering (협업 필터링을 활용한 태그 키워드 기반 개인화 북마크 검색 추천 시스템)

  • Byun, Yeongho;Hong, Kwangjin;Jung, Keechul
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.11
    • /
    • pp.1878-1890
    • /
    • 2016
  • Web 2.0 has features produced the content through the user of the participation and share. The content production activities have became active since social network service appear. The social bookmark, one of social network service, is service that lets users to store useful content and share bookmarked contents between personal users. Unlike Internet search engines such as Google and Naver, the content stored on social bookmark is searched based on tag keyword information and unnecessary information can be excluded. Social bookmark can make users access to selected content. However, quick access to content that users want is difficult job because of the user of the participation and share. Our paper suggests a method recommending search word to be able to access quickly to content. A method is suggested by using Collaborative Filtering and Jaccard similarity coefficient. The performance of suggested system is verified with experiments that compare by 'Delicious' and "Feeltering' with our system.

An Update on Accumulating Exercise and Postprandial Lipaemia: Translating Theory Into Practice

  • Miyashita, Masashi;Burns, Stephen F.;Stensel, David J.
    • Journal of Preventive Medicine and Public Health
    • /
    • v.46 no.sup1
    • /
    • pp.3-11
    • /
    • 2013
  • Over the last two decades, significant research attention has been given to the acute effect of a single bout of exercise on postprandial lipaemia. A large body of evidence supports the notion that an acute bout of aerobic exercise can reduce postprandial triacylglycerol (TAG) concentrations. However, this effect is short-lived emphasising the important role of regular physical activity for lowering TAG concentrations through an active lifestyle. In 1995, the concept of accumulating physical activity was introduced in expert recommendations with the advice that activity can be performed in several short bouts throughout the day with a minimum duration of 10 minutes per activity bout. Although the concept of accumulation has been widely publicised, there is still limited scientific evidence to support it but several studies have investigated the effects of accumulated activity on health-related outcomes to support the recommendations in physical activity guidelines. One area, which is the focus of this review, is the effect of accumulating exercise on postprandial lipaemia. We propose that accumulating exercise will provide additional physical activity options for lowering postprandial TAG concentrations relevant to individuals with limited time or exercise capacity to engage in more structured forms of exercise, or longer bouts of physical activity. The benefits of accumulated physical activity might translate to a reduced risk of cardiovascular disease in the long-term.

Design and Implementation of Social Search System using user Context and Tag (사용자 컨텍스트와 태그를 이용한 소셜 검색 시스템의 설계 및 구현)

  • Yoon, Tae Hyun;Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.1-10
    • /
    • 2012
  • Recently, Social Network services(SNS) is gaining popularity as Facebook and Twitter. Popularity of SNS leads to active service and social data is to be increased. Thus, social search is remarkable that provide more meaningful information to users. but previous studies using social network structure, network distance is calculated using only familiarity. It is familiar as distance on network, has been demonstrated through several experiments. If taking advantage of social context data that users are using SNS to produce, then familiarity will be helpful to evaluate further. In this paper, reflect user's attention through comments and tags, Facebook context is determined using familiarity between friends in SNS. Facebook context is advantageous finding a friend who has a similar propensity users in context of profiles and interests. As a result, we provide a blog post that interest with a close friend. We also assist in the retrieval facilities using Near Field Communication(NFC) technology. By the experiment, we show the proposed soicial search method is more effective than only tag.