• Title/Summary/Keyword: Dynamic ID

Search Result 109, Processing Time 0.021 seconds

An Efficient Hybrid Anti-collision Method in RFID systems (RFID 시스템에서 Hybrid 방식을 이용한 효율적인 충돌 회피 기법)

  • Shin, Song-Yong;Hwang, Gyung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1619-1624
    • /
    • 2012
  • If multiple Tags in the RFID System transmit their IDs to the Reader at the same time, tag identification time is delayed due to collisions. Therefore, to reduce the reader's identification time, an efficient anti-collision technology is needed. In this paper, we propose a hybrid anti-collision method based on the QT and DFSA. Then, the performances of proposed method are compared with the existing method through extensive simulations.

An Evaluation of Crashworthiness for the Full Rake KHST Using ID Model (1차원 모델을 이용한 한국형 고속전철의 충돌 안전도 평가)

  • 구정서;조현직;김동성;윤영한
    • Proceedings of the KSR Conference
    • /
    • 2001.10a
    • /
    • pp.217-222
    • /
    • 2001
  • The best method to evaluate crashworthiness of a trainset as a whole is to analyse one dimensional dynamic model composed of nonlinear dampers, springs and bars, and masses. In this study, crashworthiness of KHST was evaluated by analysing a nonlinear spring/bar-damper-mass model. The numerical results show that the KHST can easily absorb kinetic energy at lower impact force and acceleration in a heavy collision, when compared with KTX. Also, the KHST can be protected from any damage in its carbody and components except the prepared energy absorbing tube in a light collision, like a traint-to-train accident at speed under 8 kph. However, the KTX can be much damaged in the a light collision because there is no energy absorbing tube.

  • PDF

Analysis and Degradation of leakage Current in submicron Device (미세소자에서 누설전류의 분석과 열화)

  • 배지철;이용재
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 1996.11a
    • /
    • pp.113-116
    • /
    • 1996
  • The drain current of the MOSFET in the off state(i.e., Id when Vgs=0V) is undesired but nevertheless important leakage current device parameter in many digital CMOS IC applications (including DRAMs, SRAMs, dynamic logic circuits, and portable systems). The standby power consumed by devices in the off state have added to the total power consumed by the IC, increasing heat dissipation problems in the chip. In this paper, hot-carrier-induced degra- dation and gate-induced-drain-leakage curr- ent under worse case in P-MOSFET\`s have been studied. First of all, the degradation of gate-induced- drain-leakage current due to electron/hole trapping and surface electric field in off state MOSFET\`s which has appeared as an additional constraint in scaling down p-MOSFET\`s. The GIDL current in p-MOSFET\`s was decreased by hot-electron stressing, because the trapped charge were decreased surface-electric-field. But the GIDL current in n-MOS77T\`s under worse case was increased.

  • PDF

Performance Evaluation of Commercial Vehicle with MR Seat Damper (MR 시트댐퍼를 장착한 상용차의 제어성능 평가)

  • 성금길;이호근;남무호;최승복
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2003.05a
    • /
    • pp.1048-1053
    • /
    • 2003
  • This paper proposed a MR(Magneto-rheological) seat damper for a commercial vehicle. After formulating the governing equation of motion, an appropriate size of damper is designed and manufactured. Following the equation of fie d-dependent damping force characteristics, a semi-active seat suspension installed with the proposed MR-damper is constructed and its dynamic model id established, Subsequently, vibration isolation performance of the semi-active suspension system is demonstrated by incorporating with a MRAC(Model referenced adaptive control) fer the MR Seat Damper

  • PDF

Design and Implementation on High Efficient EPMS(Energy-Power Management System) for USN Sensor Node Using Self-Charging Module (자가 충전 모듈을 이용한 USN 센서노드용 고효율 에너지 전력관리 시스템 구현 및 검증)

  • Kim, Hyun-Woong;Park, Hee-Jeong;Lim, Se-Mi;Oh, Jong-Hwa;Roh, Hyoung-Hwan;Park, Jun-Seok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.1
    • /
    • pp.124-130
    • /
    • 2011
  • In this paper, We design and implementation of Self-Charging Module for charging to battery which obtaining the environment inergy such as solar energy. The power chared battery through the charging module send to sensor node. And implementation of System Activation Module(SAM) based on ID system and Dynamic Power Management Module(DPM) with SPO(Self Power Off). This system consume power only communication between the sensor nodes. We verification this system by implementing the high efficiency poweer management system.

Weaknesses and Improvement of User Authentication Scheme against Smart-Card Loss Attack (스마트 카드 분실 공격에 안전한 사용자 인증 스킴의 취약점 및 개선방안)

  • Choi, Younsung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.95-101
    • /
    • 2016
  • With the rapid development of Internet and communication network technology, various studies had proceeded to develop the technology of wireless sensor networks. Authentication schemes for user and sensor are critical and important security issue to use wireless sensors legally. First, Das introduce a user authentication scheme using smart card and password for wireless sensor networks, various studies had proceeded. Chem et al. suggested a secure user authentication scheme against smart card loss attack but Chen et al. scheme does not still resolve some security vulnerability such as perfect forward secrecy, session key exposure by gateway node, anonymity, and the password check. To resolve the problems, this paper proposes a security enhanced user authentication using the fuzzy extraction, elliptic curves cryptography and dynamic ID and analyzes the security.

A Robust and Secure Remote User Authentication Scheme Preserving User Anonymity (사용자 익명성을 보장하는 안전하고 개선된 원격 사용자 인증스킴)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.81-93
    • /
    • 2013
  • Remote user authentication is a method, in which remote server verifies the legitimacy of a user over an common communication channel. Currently, smart card based remote user authentication schemes have been widely adopted due to their low computational cost and convenient portability for the mutual authentication. 2009 years, Wang et al.'s proposed a dynamic ID-based remote user authentication schemes using smart cards. They presented that their scheme preserves anonymity of user, has the feature of storing password chosen by the server, and protected from several attacks. However, in this paper, I point out that Wang et al.'s scheme has practical vulnerability. I found that their scheme does not provide anonymity of a user during authentication. In addition, the user does not have the right to choose a password. And his scheme is vulnerable to limited replay attacks. In particular, the parameter y to be delivered to the user is ambiguous. To overcome these security faults, I propose an enhanced authentication scheme, which covers all the identified weakness of Wang et al.'s scheme and an efficient user authentication scheme that preserve perfect anonymity to both the outsider and remote server.

Design and Fabrication of a GaAs MESFET MMIC Transmitter for 2.4 GHz Wireless Local Loop Handset (2.4 GHz WLL 단말기용 GaAs MESFET MMIC 송신기 설계 및 제작)

  • 성진봉;홍성용;김민건;김해천;임종원;이재진
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.11 no.1
    • /
    • pp.84-92
    • /
    • 2000
  • A GaAs MESFET MMIC transmitter for 2.4 GHz wireless local loop handset is designed and fabricated. The transmitter consists of a double balanced active mixer and a two stage driver amplifier with voltage negative feedback. In particular, a pair of CS-CG(common source-common gate) structure compensates the reduction in dynamic range caused by unbalanced complementary IF input signals. And to suppress the leakage local power at RF port, the mixer is designed by using phase characteristic between the ports of MESFET. At the bias condition of 2.7 V and 55.2 mA, the fabricated MMIC transmitter with chip dimensions of $0.75\times1.75 mm^2$ obtains a measured conversion gain of 38.6 dB, output $P_{idB}$ of 11.6 dBm, and IMD3 at -5 dBm RF output power of -31.3 dBc. This transmitter is well suited for WLL handset.

  • PDF

A Point-to-Multipoint Routing Path Selection Algorithm for Dynamic Routing Based ATM Network (동적 라우팅기반의 점대다중점 라우팅 경로 선택)

  • 신현순;이상호;이경호;박권철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8A
    • /
    • pp.581-590
    • /
    • 2003
  • This paper proposes the routing path selection mechanism for source routing-based PtMP (Point-to-Multipoint) call in ATM switching system. Especially, it suggests PtMP routing path selection method that can share the maximum resource prior to the optimal path selection, guarantee the reduction of path calculation time and cycle prevention. The searching for the nearest branch point from destination node to make the maximum share of resource is the purpose of this algorithm. Therefore among neighbor nodes from destination node by back-tracking, this algorithm fixes the node crossing first the node on existing path having the same Call ID as branch node, constructs the optimal PtMP routing path. The optimal node to be selected by back-tracking is selected by the use of Dijkstra algorithm. That is to say, PtMP routing path selection performs the step of cross node selection among neighboring nodes by back-tracking and the step of optimal node selection(optimal path calculation) among neighboring nodes by back-tracking. This technique reduces the process of search of routing information table for path selection and path calculation, also solves the cycle prevention easily during path establishment.

Efficient RFID Search Protocols Providing Enhanced User Privacy (강화된 사용자 프라이버시를 보장하는 효율적인 RFID 검색 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Nyang, Dae-Hun;Lee, Mun-Kyu;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.347-356
    • /
    • 2009
  • In an RFID search protocol, a reader uses designated query to determine whether a specific tag is in the vicinity of the reader. This fundamental difference makes search protocol more vulnerable to replay attacks than authentication protocols. Due to this, techniques used in existing RFID authentication protocols may not be suitable for RFID search protocols. In this paper, we propose two RFID search protocols, one based on static ID and the other based on dynamic ID, which use counter to prevent replay attacks. Moreover, we propose a security model for RFID search protocols that includes forward/backward traceability, de-synchronization and forgery attack. Based on this model, we analyze security of our protocols and related works.