• Title/Summary/Keyword: Between reader

Search Result 366, Processing Time 0.025 seconds

A Study of Relationship between the Reading Activities and the Reading Camp Program (독서캠프 프로그램을 통한 독서활동 전개에 관한 연구 - 독서지도자와 집단지도 대상자와의 상호 독서활동을 중심으로 -)

  • 김승환
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.2
    • /
    • pp.239-267
    • /
    • 2001
  • The reading camp program for mutual reading activities between reader`s advisers and readers which has been played four times in 2000 shows the reaction to reading activities among them as follows. $\circled1$ All of reader`s advisers and readers took an active part in the reading camp program and reader's advisers were more active. $\circled2$ All of participants of the reading camp was satisfied by all of the reading program and especially leaders were affected by daily life of reader`s advisers. $\circled3$ All of participants had an opportunity of reflections on his reading activities and leader`s advisers established their sense of life and sense of values in more affirmative. The reading camp program helped participant to enhance his reading life very much and yet reader`s advisers acquired something more than readers did especially.

  • PDF

A Wireless Identification System Using a Solar Cell and RF Transceivers (솔라셀과 RF송수신기를 이용한 무선인식장치)

  • Lee, Seong-Ho
    • Journal of Sensor Science and Technology
    • /
    • v.25 no.5
    • /
    • pp.337-343
    • /
    • 2016
  • In this paper, we newly introduce a wireless identification system using a solar cell and RF transceivers. The reader sends interrogating signal to a transponder using LED visible light, and the transponder responds to the reader using RF signal. The transponder consists of a solar cell, an amplifier, a microprocessor, and an RF transmitter. The solar cell receives the visible light from the reader and generates current to supply electric power to the other devices in the transponder. At the same time, the solar cell detects interrogating signal in the reader light. The microprocessor senses the interrogating signal and generates a responding signal. The RF transmitter radiates the responding signal to the reader. The transponder is a passive circuit because it operates without external power. In experiments, the maximum read distance between a reader and a transponder was about 1.6 meter.

An Enhanced Genetic Algorithm for Reader Anti-collision in RFID System (RFID 시스템에서의 리더 충돌 방지를 위한 개선된 유전자 알고리즘)

  • Seo, Hyun-Sik;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.85-94
    • /
    • 2008
  • When an RFID reader uses the same frequency or adjacent frequency with neighbor readers, the interference might occur. These interferences cause the RFID reader collision and errors during tag recognition. Therefore, the international standard for RFID and some papers proposed the methods to reduce the reader collision. The reader interference is closely related to the distance between the readers haying interference and used frequency band. In the previous RFID reader anti-collision algorithms, the location of readers inducing interference which is closely related to interference of readers is not considered. Only the reader collision is tried to reduce through frequency transfer after collisions occur or modification of frame size in relation to collision probability based a TDM(Time Division Multiplex). In this paper, the genetic algorithm using two-dimensional chromosome which reflect readers' location is proposed to prevent reader collision effectively. By executing evolutionary operation with two-dimensional chromosome, the location information having influence on reader interference can be used. The repair operation in the proposed algorithm makes all reader stably recognize their tags.

Design and Implementation of a R1000/R2000 based RFID Reader Which Supports the Low Level Reader Protocol (LLRP를 지원하는 R1000/R2000 겸용 RFID 리더)

  • Bae, Sung-Woo;Ryu, Won-Sang;Kwak, Ho-Gil;Joung, Sub-Myoung;Park, Jun-Seok;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.279-286
    • /
    • 2010
  • RFID reader protocol is an interface between RFID readers and higher (host) such as RFID middlewares and applications. At present, reader protocols provided by vendors are different from each other and there are compatibility problems in environment using heterogeneous readers. In this paper, to solve this problem, an RFID reader which supports LLRP(Low Level Reader Protocol), a well-known standard reader protocol presented by EPCglobal is designed and implemented. It is designed with two modules and supports various interfaces for easy adaptation to various applications. The LLRP protocol is implemented over a embedded LINUX multi-thread environment. It not only supports almost all properties of LLRP, and is designed with flexible hardware/software architecture to meet various requirements.

A Low-Cost RFID Tag Search Protocol Preventing the Reuse of Mobile Reader's Tag-List (모바일 리더의 태그 리스트 재사용을 방지하는 저비용 RFID 태그 검색 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Choi, Hyun-Woo;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2011
  • When a real-time data transfer is not possible between a reader and a back-end server in the mobile environment, the reader should support a capability to search a certain tag without communicating with a back-end server. Some recent papers related to the mobile reader-based tag search protocol have addressed privacy concerns for the reader and the tags. However, to our best knowledge, there are no papers addressing the problem arising from reusing tag lists existed in the mobile reader. In other words, there arise a problem that a mobile reader which has lost an right to access to a specific tag is able to search that tag by reusing a tag list for searching a particular tag. If mobile reader having an unauthorized tag list, the mobile reader can reuse a particular tag list. Our protocol provides the enhanced secure tag lists preventing the reuse of the tag lists and an efficient tag search protocol based on dynamic identity in the mobile reader-based RFID environments.

A Anonymous Authorization Scheme Based on ECC for RFID Privacy (RFID 프라이버시를 위한 ECC기반의 익명인증기법)

  • Jin, Shi-Mei;Li, Yong-Zhen;Lee, Sang-Ho;Rhee, Chung-Sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.293-298
    • /
    • 2008
  • Recently, with the development of mobile techniques and the consideration to conveniency of using, the research on Mobile RFID Reader technique is getting more and more attentions. Until now, all security authentication algorithms of RFID are algorithms about range between Tag and Reader. The range between Reader and backend DB is composed by wired networks, so it's supposed to be secure range. But it must be taken account of the problem of information security and privacy in wireless range during the design of Mobile RFID Reader. In this paper we design an blind signature scheme based on weil-paring finite group's ECC encryption scheme, and by using this blind signature we propose the anonymous authorization scheme to Mobile RFID Reader's users.

A Study on the Data Anti-collision using Time-domain Procedure on RFID(Radio Frequency Identification) System (무선인식 시스템에서 시간절차를 이용한 데이터 충돌 방지에 관한 연구)

  • 강민수;신석균;이준호;이동선;유광균;박영수;이기서
    • Journal of the Korean Society for Railway
    • /
    • v.4 no.4
    • /
    • pp.155-161
    • /
    • 2001
  • In this paper, the method is suggested to prevent data collision or damage on RFID(Radio Frequency Identification) system, in case a reader reading multi-tag simultaneously, using binary-search algorithm and Time-domain anti-collision procedure at reader and tag, respectively. The RFID system is designed that Reader enable to communicate with Tag on 13.56MHz bandwidth which is ISM(Industrial Science Medical) bandwidth, antennas of Tag part are designed using MCRF335 Chip. When RF communication is achieved between reader and tag, in case that data is transmitted to reader pass through multiple tags simultaneously, a study on the anti-collision method for the situation that the data collision occurs is performed.

  • PDF

A Design and Implementation of 2.4GHz Active RFID Reader Protocol using Channel Switching (채널 스위칭을 이용한 2.4GHz 능동형 RFID 리더 프로토콜 설계 및 구현)

  • Kim, Dong-Hyun;Lee, Chae-Suk;Kim, Jong-deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.95-98
    • /
    • 2009
  • RFID(Radio Frequency IDentification) technology is an automatic identification method using radio frequencies between RFID reader which collects the informatin and tag which transmits the information. RFID technology develops passive RFID which transmit the only ID to active RFID which transmit the additional information such as sensing information. there is ISO/IEC 18000-7 as typical standard of active RFID. it is single channel system of 433.92MHz and has limitation of collection of a number of tags. to overcome limitation of collection of many tags, we propose the new 2.4GHz active RFID technology which can use the multi-channel. if reader has multi-interface and uses another channel in each, reader could fast collect the tags. but, if a reader which has many interfaces collects tags through the specific interface, the performance may not improve any more comparing with a reader using single interface. in this paper, we show the fast collection through design and implementation of protocol for load balancing between interfaces in multi-interface RFID reader.

  • PDF

Game Theoretic Analysis for RFID Reader Collision (RFID 리더 주파수 간섭에 대한 게임 이론 관점에서의 해석)

  • Lee, Dong-Yul;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.36-47
    • /
    • 2009
  • There exists RFID reader-to reader frequency which can not recognize tag in dense reader nude because the interference causes low SIR. To solve this frequency, the many algorithms based on TDM have been proposed. But the most of existing algorithms not obtain the optimal time allocation but propose heuristic scheduling algorithm. In this paper, we apply game theory which deals with interest between players of game to RFID reader-to reader interference and analyze the time allocation problem of reader based on TDM in terms of cooperative game which the players bind agreements using Nash Bargaining Solution(NBS) and non-cooperative game which the players do not bind agreements using Nash Equilibrium(NE). The applied results show that in dense reader mode, NBS of cooperative game is superior to NE of non-cooperative game and present optimal time allocation in dense reader mode.

A Design of RFID Mutual Authentication System based on Open Channel (공개 채널 기반의 RFID 상호인증 시스템 설계)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10C
    • /
    • pp.946-954
    • /
    • 2009
  • General RFID system has assumed that the communication channel between reader and back-end database is secure channel. However, the reader can be communicated with the database through insecure channel like the communication channel between the reader and the tag according to application environment. In this paper, we propose a new secure RFID mutual authentication protocol based on open network channel which assumed that all communication channels between the database, the reader and the tag are insecure communication channels. The proposed protocol uses a secure one-way hash function to provide authentication and integrity against all communication messages which exchanged on the open channels. In addition, we designed that the proposed protocol can provide forward secrecy by performing the database and the tag update their old secret key with a new secret key after finished mutual authentication.