• Title/Summary/Keyword: Device identification

Search Result 390, Processing Time 0.028 seconds

Improve distance of Passive RFID system for 900MHz Using SAW device (SAW device를 이용한 900MHz 대역 수동형 RFID system의 인식거리 향상 연구)

  • Park, Joo-Yong;Kim, Jae-Kwon;Kim, Kyung-Hwan;Yeo, Joon-Ho;Burm, Jin-Wook
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.975-976
    • /
    • 2006
  • The passive type RFID (Radio Frequency Identification) System using Surface Acoustic Wave (SAW) tag at 900 MHz in the range of more than 1 m was fabricated. To improve interrogation range of the system propose a method to increase isolation between transmitter and receiver. This method using a direct conversion architecture achieves a leakage rejection of 10 dB increased compared with conventional system. Measured interrogation range is more than 1 m.

  • PDF

Object Recognition Algorithm with Partial Information

  • Yoo, Suk Won
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.229-235
    • /
    • 2019
  • Due to the development of video and optical technology today, video equipments are being used in a variety of fields such as identification, security maintenance, and factory automation systems that generate products. In this paper, we investigate an algorithm that effectively recognizes an experimental object in an input image with a partial problem due to the mechanical problem of the input imaging device. The object recognition algorithm proposed in this paper moves and rotates the vertices constituting the outline of the experimental object to the positions of the respective vertices constituting the outline of the DB model. Then, the discordance values between the moved and rotated experimental object and the corresponding DB model are calculated, and the minimum discordance value is selected. This minimum value is the final discordance value between the experimental object and the corresponding DB model, and the DB model with the minimum discordance value is selected as the recognition result for the experimental object. The proposed object recognition method obtains satisfactory recognition results using only partial information of the experimental object.

Design and Development of Patient-aware System using Mobile Device (모바일 기기를 이용한 환자 자동인식 시스템의 설계 및 구현)

  • Lim, Jae-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1496-1504
    • /
    • 2007
  • The purpose of this paper, as a part of healthcare research, is to design and development Patient-aware System that will support EMR(Electronic Medical Record) in hospital. A mobile device-based system that can use database of existing EMR, replace existing paper-type chart, and identify patient fast and correctly was developed. To identify patient, RFID(Radio Frequency Identification) was used, and through interworking RFID and the system, it is possible to identify patient automatically. The developed system was tested in the test bed, and the possibility of faster diagnosis and treatment than existing paper-type chart was tested.

  • PDF

Analyses of Framework for Enhanced RFID Security and Privacy (개선된 RFID 보안 및 비밀성을 위한 프레임워크의 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.885-888
    • /
    • 2009
  • Radio Frequency IDentification (RFID) is a method of remotely storing and retrieving data using small and inexpensive devices called RFID tags. In this paper we propose a proxy agent framework that uses a personal device for privacy enforcement and increased protection against eavesdropping, impersonation and cloning attacks. Using the proxy model a user decides when and where information carried in a tag will be released. In particular, the user can put tags under her/his control, authenticated requests, release tags, transfer them to new owners, and so on. In this paper, we analyses a new type of simple a framework for enhancing RFID security by means of a proxy, a personal device that assumes control of a user's tags.

  • PDF

Continuous Human Activity Detection Using Multiple Smart Wearable Devices in IoT Environments

  • Alshamrani, Adel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.221-228
    • /
    • 2021
  • Recent improvements on the quality, fidelity and availability of biometric data have led to effective human physical activity detection (HPAD) in real time which adds significant value to applications such as human behavior identification, healthcare monitoring, and user authentication. Current approaches usually use machine-learning techniques for human physical activity recognition based on the data collected from wearable accelerometer sensor from a single wearable smart device on the user. However, collecting data from a single wearable smart device may not provide the complete user activity data as it is usually attached to only single part of the user's body. In addition, in case of the absence of the single sensor, then no data can be collected. Hence, in this paper, a continuous HPAD will be presented to effectively perform user activity detection with mobile service infrastructure using multiple wearable smart devices, namely smartphone and smartwatch placed in various locations on user's body for more accurate HPAD. A case study on a comprehensive dataset of classified human physical activities with our HAPD approach shows substantial improvement in HPAD accuracy.

Design and Implementation of Mobile Platform for Personalized Media Streaming Service (사용자 맞춤형 미디어 스트리밍 서비스를 위한 모바일 플랫폼 설계 및 구현)

  • Park, Sung-Joo;Yang, Chang-Mo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.07a
    • /
    • pp.360-363
    • /
    • 2010
  • Streaming Technology can support the real-time playback without downloading and storing multimedia data in local HDD. So, client browser or plug-in can represent multimedia data before the end of file transmission using streaming technology. Recently, the demand for efficient real-time playback and transmission of large amounts of multimedia data is growing rapidly. But most users' connections over network are not fast and stable enough to download large chunks of multimedia data. In this paper, we propose an intelligent IP streaming system based on personalized media service. The proposed IP streaming system enables users to get an intelligent recommendation of multimedia contents based on the user preference information stored on the streaming server or the home media server. The supposed intelligent IP streaming system consists of Server Metadata Agent, Pumping Server, Contents Storage Server, Client Metadata Agent and Streaming Player. And in order to implement the personalized media service, the user information, user preference information and client device information are managed under database concept. Moreover, users are assured of seamless access of streamed content event if they switch to another client device by implementing streaming system based on user identification and device information. We evaluate our approach with manufacturing home server system and simulation results.

  • PDF

Remote Devices Data Monitoring System based on Wireless PDA (무선 PDA 기반의 원격 장치 데이터 모니터링 시스템)

  • Seo, Jung-Hee;Kim, Kil-Young;Park, Hung-Bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.611-614
    • /
    • 2007
  • This paper suggests a TCP/IP-based remote data monitoring system, which combines PDA (Personal Digital Assistant) and WLAN (Wireless Local Area Network) technologies. Wireless PDA devices are used for remote monitoring of wireless communication by continuously collecting remote device data transmitted from servers such as temperature, humidity and device status, and displaying them on mobile devices. Therefore, remote data monitoring systems that integrate wireless and wired services provide data collection adaptive to administrators and efficient identification of device status.

  • PDF

Design and Implementation of Intelligent IP Streaming Module Based on Personalized Media Service (개인 맞춤형 미디어 서비스 기반 지능형 IP 스트리밍 모듈 설계 및 구현)

  • Park, Sung-Joo;Yang, Chang-Mo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.2
    • /
    • pp.79-83
    • /
    • 2009
  • Streaming Technology can support the real-time playback without downloading and storing multimedia data in local HDD. So, client browser or plug-in can represent multimedia data before the end of file transmission using streaming technology. Recently, the demand for efficient real-time playback and transmission of large amounts of multimedia data is growing rapidly. But most users' connections over network are not fast and stable enough to download large chunks of multimedia data. In this paper, we propose an intelligent IP streaming system based on personalized media service. The proposed IP streaming system enables users to get an intelligent recommendation of multimedia contents based on the user preference information stored on the streaming server or the home media server. The supposed intelligent IP streaming system consists of Server Metadata Agent, Pumping Server, Contents Storage Server, Client Metadata Agent and Streaming Player. And in order to implement the personalized media service, the user information, user preference information and client device information are managed under database concept. Moreover, users are assured of seamless access of streamed content event if they switch to another client device by implementing streaming system based on user identification and device information. We evaluate our approach with manufacturing home server system and simulation results.

  • PDF

Leveraging the Smart device for waterworks manhole management (상수도맨홀 관리를 위한 스마트 관리장치의 활용)

  • Chun, Haebok;Kim, Yeongkwan
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.31 no.2
    • /
    • pp.141-148
    • /
    • 2017
  • The waterworks company is in charge of managing water facilities buried underground, and the management has been centered on manholes. However, since there is no standard management manual, it has been impossible to introduce and operate a systemized managing tool by water service providers and managers, and manhole management has been carried out by individual data recording personnel for each water service provider. When the management is carried out individually, the data to be shared by other waterworks managers tend to be privatized, and consequently, it may become a big obstacle to proceed with many civil works such as emergency leak repair, road excavation, replacement of old buildings. This report introduces RFID (Radio Frequency Identification) system which is based on the magnetic field capable of IOT. It also describes the necessity of leveraging the system for smart managing of pipe management record that has been done by hand writing. The RFID system includes RFID marker, data reader, portable computer operating program, and data base server operating program. In this system, the data is managed with a single communication device, and it would be possible to share the information on the underground facilities and water treatment facilities. This RFID technology is expected to provide water service providers with opportunities to develop more scientific and modernized underground facilities information systems.

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.