• Title/Summary/Keyword: Active user identification

Search Result 15, Processing Time 0.022 seconds

Design and Implementation of RSSI-based Intelligent Location Estimation System (RSSI기반 지능형 위치 추정 시스템 설계 및 구현)

  • Lim, Chang Gyoon;Kang, O Seong Andrew;Lee, Chang Young;Kim, Kang Chul
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.9-18
    • /
    • 2013
  • In this paper, we design and implement an intelligent system for finding objects with RFID(Radio Frequency IDentification) tag in which an mobile robot can do. The system we developed is a learning system of artificial neural network that uses RSSI(Received Signal Strength Indicator) value as input and absolute coordination value as target. Although a passive RFID is used for location estimation, we consider an active RFID for expansion of recognition distance. We design the proposed system and construct the environment for indoor location estimation. The designed system is implemented with software and the result related learning is shown at test bed. We show various experiment results with similar environment of real one from earning data generation to real time location estimation. The accuracy of location estimation is verified by simulating the proposed method with allowable error. We prepare local test bed for indoor experiments and build a mobile robot that can find the objects user want.

Factors Analysis Affecting Success of RFID Implementation (RFID 실행의 성공에 미치는 영향요인 분석)

  • Park, Yong-Jae;Rim, Myung-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.157-167
    • /
    • 2012
  • RFID(Radio Frequency Identification) is regarded as one of the greatest contributing 10 technologies of the 21st century, and is a promising technology available to all industries. Each country has tried to develop RFID technology and foster its industry, and Korea has also chosen it as one of new growth engine industries with active support policies. This study was presenting implications necessary to stimulate and expedite RFID demand by analyzing the factors affecting the success of RFID implementation. In order to achieve this purpose, we categorized the factors affecting successful RFID implementation into user factors, technical factors, organizational factors, and external factors, and probed them in the previous literatures. Based on this, conceptual research model and hypothesis were set. Data collection was performed through companies adopting and running RFID, and research model and hypothesis were tested with structural equation model analysis. Finally, implications necessary to stimulate RFID demand and foster its industry were presented founded on the result of empirical analysis.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

A Study on Location Untraceability Service and Payment Protocol using Temporary Pseudonym in Mobile Communication Environments (이동통신 환경에서 임시 익명 아이디를 이용한 위치 불추적 서비스와 지불 프로토콜에 관한 연구)

  • 김순석;김성권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.2
    • /
    • pp.78-92
    • /
    • 2003
  • In related to mobile communication environment, many researchers have studied problems concerning current locations of mobile users and exposure of their movements in the privacy aspect so far [1,2,3,4,5,6,7,8,9]. Among them, Kesdogan and Pfitzmann [3,6] proposed effective solutions using temporary pseudonym identification, called TP(Temporary Pseudonym ) to solve them. After that, Kesdogan et al. proposed an improved method protecting mobile users from some types of attacks of network providers in [8]. However, among their methods, in particular the method, attaching the other new device (so-called Reachability Manager) to system against active attack of network providers, is alterative rather than practical and is not clear. Moreover, it requires the other cost and overhead. Therefore we propose a practical method against active attack of network providers without attaching new device in original environments. The basie idea of proposed method is to protect a fraud act of network provider as a inside user by exchanging a secret information, which only users and network providers know, via network provider between mobile user and the trusted third party (so-called Trust Device). Moreover, we introduce a new payment protocol which applied our method.

POTENTIAL APPLICATIONS FOR NUCLEAR ENERGY BESIDES ELECTRICITY GENERATION: A GLOBAL PERSPECTIVE

  • Gauthier, Jean-Claude;Ballot, Bernard;Lebrun, Jean-Philippe;Lecomte, Michel;Hittner, Dominique;Carre, Frank
    • Nuclear Engineering and Technology
    • /
    • v.39 no.1
    • /
    • pp.31-42
    • /
    • 2007
  • Energy supply is increasingly showing up as a major issue for electricity supply, transportation, settlement, and process heat industrial supply including hydrogen production. Nuclear power is part of the solution. For electricity supply, as exemplified in Finland and France, the EPR brings an immediate answer; HTR could bring another solution in some specific cases. For other supply, mostly heat, the HTR brings a solution inaccessible to conventional nuclear power plants for very high or even high temperature. As fossil fuels costs increase and efforts to avoid generation of Greenhouse gases are implemented, a market for nuclear generated process heat will be developed. Following active developments in the 80's, HTR have been put on the back burner up to 5 years ago. Light water reactors are widely dominating the nuclear production field today. However, interest in the HTR technology was renewed in the past few years. Several commercial projects are actively promoted, most of them aiming at electricity production. ANTARES is today AREVA's response to the cogeneration market. It distinguishes itself from other concepts with its indirect cycle design powering a combined cycle power plant. Several reasons support this design choice, one of the most important of which is the design flexibility to adapt readily to combined heat and power applications. From the start, AREVA made the choice of such flexibility with the belief that the HTR market is not so much in competition with LWR in the sole electricity market but in the specific added value market of cogeneration and process heat. In view of the volatility of the costs of fossil fuels, AREVA's choice brings to the large industrial heat applications the fuel cost predictability of nuclear fuel with the efficiency of a high temperature heat source tree of Greenhouse gases emissions. The ANTARES module produces 600 MWth which can be split into the required process heat, the remaining power drives an adapted prorated electric plant. Depending on the process heat temperature and power needs, up to 80% of the nuclear heat is converted into useful power. An important feature of the design is the standardization of the heat source, as independent as possible of the process heat application. This should expedite licensing. The essential conditions for success include: ${\bullet}$ Timely adapted licensing process and regulations, codes and standards for such application and design ${\bullet}$ An industry oriented R&D program to meet the technological challenges making the best use of the international collaboration. Gen IV could be the vector ${\bullet}$ Identification of an end user(or a consortium of) willing to fund a FOAK