• Title/Summary/Keyword: EPCGlobal

Search Result 173, Processing Time 0.022 seconds

A Transformation Scheme for Continuous Queries on RFID Streaming Data (RFID 스트리밍 데이터 처리를 위한 연속 질의의 변환 기법)

  • Park, Jae-Kwan;Hong, Bong-Hee;Ban, Chae-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.273-284
    • /
    • 2007
  • RFID middleware systems collect and filter the RFID streaming data gathered continuously by numerous readers in order to process requests from applications. These requests are called continuous queries because they are kept on executing during certain periods. To enhance the performance of the middleware, it is required to build an index to process the continuous queries efficiently. Several approaches of building an index on not data records but queries, called Query Index, are proposed and widely used for evaluating continuous queries over streaming data. The EPCglobal proposed an Event Cycle Specification (ECSpec) model, which is a standard query interface for RFID applications. Continuous queries based on ECSpec consist of a large number of segments for representing the query conditions. The problem with using any of the existing query indexes on these continuous queries is that it takes a long time to build the index because it is necessary to insert a large number of segments into the index. To solve this problem, we propose an Aggregate Transformation that converts a group of segments into a compressed data which is representative of the segments. We compare the performance of a transformed index with the existing query indexes.

Performance Improvement of Anti-collision Algorithm for RFID Protocol and Algorithm Comparison (RFID 프로토콜의 충돌방지 알고리즘의 성능 개선과 알고리즘 비교)

  • Lim, Jung-Hyun;Kim, Ji-Yoon;Jwa, Jeong-Woo;Yang, Doo-Yeong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.51-61
    • /
    • 2007
  • In this paper, Air-interface protocols of ISO 18000-6 Types and EPCglobal Classes applied to RFID system in UHF band are analyzed, and those anticollision algorithms are realized. Also, the each algorithm which improves the performance of standard protocol is proposed, and the performance is compared when clock period of link timing is a identical condition on $12.5{\mu}s$. As the result, when 500 tags exist simultaneously inside reader interrogation zone, the tag recognition performance of a standard protocol is better in preceding order of Class-1 Generation-1, Type B, Type A, Class-0 and Class-1 Generation-2. And also the performance of improved protocol is better in ascending order of Type B, Type A, Class-1 Generation-1, Class-0 and Class-1 Generation-2. Therefore, performance of tag recognition remarkably depends on the regulated clock period in the protocol and link timing between a reader and a tag.

A Study on RFID Code Structure for Traceability System of Electric Vehicle Batteries (전기자동차 배터리 추적 시스템을 위한 RFID 코드체계 설계에 관한 연구)

  • Kim, Woo-Ram;Chang, Yoon-Seok
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.4
    • /
    • pp.95-104
    • /
    • 2013
  • As global warming and depletion of fossil fuel are considered as urgent problems, the development of electric vehicle (EV) is getting more attention by automobile industry. However, the wide adoption of EVs is not coming yet, because of many issues such as long recharging time and high cost of batteries etc. As an alternative solution to the conventional battery charging EV, the idea of battery exchanging EV is introduced. To realize the battery exchanging business model, one should solve the issues of ownership and reliability of battery. To address such issues, the concept of battery sharing should be considered together with good traceability system. In this study, we studied RFID code structure to provide better visibility and traceability for shared EV batteries. The proposed RFID code and code generation system is based on GRAI-96 of EPCglobal and included factors such as chemical, physical, and manufacturing features. The designed code can be also used as the ID of each battery.

A Study on the Selection Process of RFID Middleware and Quality Factor Evaluation in Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서 RFID 미들웨어 선정 프로세스 및 품질 요소 평가에 대한 연구)

  • Oh, Gi-Oug;Park, Jung-Oh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.257-263
    • /
    • 2011
  • Conventional middleware is software providing services between clients and servers efficiently, but it is not applicable to RFID systems because of low consistency due to the absence of context awareness function, and problems in the management of meaning, security system, etc. Accordingly, we need a quality selection process and a quality evaluation method for selecting RFID middleware based on new criteria. This Paper proposed a new selection process based on international standard ISO/IEC 14598, and extracted and selected optimal quality factors through the proposed process. The selected quality factors were mapped to the quality characteristics of standard quality model ISO/IEC 9126, and to quality factors of RFID middleware of SUN, Microsoft, EPCglobal, IBM, etc. The results of these works showed that the quality factors extracted and selected through the proposed process were fair and adequate for evaluating the quality of RFID middleware.

Multiple Access Scheme by Dynamically Applying the Power Increasing Method in the UHF RFID System (UHF대역 RFID system에서 전력상승기법을 동적으로 적용한 다중접속방법)

  • Yim, You-Seok;Hwang, Jae-Ho;Sohn, Sung-Hwan;Kim, Jae-Moung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.5
    • /
    • pp.12-20
    • /
    • 2008
  • RFID(Radio frequency indentification) technology, that the reader detect the tag information attached on the objects without contact, is considered the kernel of realizing tile Ubiquitous Sensor Network. Particularly, because there are lots of tags(which the reader have to detect) in the UHF RFID system(that is applied at the Logistic & Distribution industry). In the UHF RFID system the negative effects, we called the tag-collision, may occur and we should solve these effects. So, in the EPCglobal Gen2 protocol they present the Slotted Random Anti-collision algorithm to prevent the tag-collision effect. In this paper, in order to minimize the tag-collision effect and bring on the system efficiency, we propose the Power Increasing Method that controls the transmission power of the reader depending on the environment and verily the improved performance.

Model of the RFID-based Product Traceability Service in u-SCM (u-SCM에서 RFID 기반 제품 추적 서비스 모델)

  • Shin, Myeong-Sook;Song, Gi-Beum;Ahn, Seong-Soo;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.954-957
    • /
    • 2007
  • The u-SCM to persue unification of the whole Supply Chain through ubiquitous computing and technical interface is raised its head for enterprise to secure endless competitive advantage and grow up constantly. This can be especially a matter of primary concern for business process elevation on various industry. The other side, The Traceability Service propelled both nationally and internationally is propelled specific industry to offer visibility and traceability of each manufacture on supply chain related to induce RFID, but standard Traceability Service Architecture isn't decided yet. This paper propose Model of Product Traceability Service which is based on EPCglobal Network to be the whole world standard architecture for the sake of efficient and perfect manufacture management on entire supply chain based on RFID.

  • PDF

Backward Channel Protection Method For RFID Tag Security in the Randomized Tree Walking Algorithm (랜덤화된 트리워킹 알고리즘에서의 RFID 태그 보안을 위한 백워드 채널 보호 방식)

  • Choi Wonjoon;Roh Byeong-hee;Yoo S. W.;Oh Young Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5C
    • /
    • pp.415-421
    • /
    • 2005
  • Passive RFID tag does not have its own power, so it has very poor computation abilities and it can deliver signals in very short range. From the facts, most RFID Tag security schemes assumed that the backward channel from tags to a reader is safe from eavesdropping. However, eavesdroppers near a tag can overhear message from a tag illegally. In this paper, we propose a method to protect the backward channel from eavesdropping by illegal readers. The proposed scheme can overcome the problems of conventional schemes such as randomized tree walking, which have been proposed to secure tag information in tree-walking algorithm as an anti-collision scheme for RFID tags. We showed the efficiency of our proposed method by using an analytical model, and it is also shown that the proposed method can provide the probability of eavesdropping in some standardized RFID tag system such as EPCglobal, ISO, uCode near to '0'.

VHDL Implementation of GEN2 Protocol for UHF RFID Tag (RFID GEN2 태그 표준의 VHDL 설계)

  • Jang, Il-Su;Yang, Hoon-Gee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1311-1319
    • /
    • 2007
  • This paper presents the VHDL implementation procedure of the passive RFID tag operating in Ultra High Frequency. The operation of the tag compatible with the EPCglobal Class1 Generation2(GEN2) protocol is verified by timing simulation after synthesis and implementation. Due to the reading range with relatively large distance, a passive tag needs digital processor which facilitates faster decoding, encoding and state transition for enhancement of an interrogation rate. In order to satisfy linking time, the pipe-line structure is used, which can minimize latency to serial input data stream. We also propose the sampling strategy to decode the Preamble, the Frame-sync and PIE symbols in reader commands. The simulation results with the fastest data rate and multi tags environment scenario show that the VHDL implemented tag performs faster operation than GEN2 proposed.

EMQT : A Study on Enhanced M-ary Query Tree Algorithm for Sequential Tag IDs (연속적인 태그 ID들을 위한 M-ary 쿼리 트리 알고리즘의 향상에 관한 연구)

  • Yang, Dongmin;Shin, Jongmin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.435-445
    • /
    • 2013
  • One of the most challenging issues in radio frequency identification (RFID) and near field communications (NFC) is to correctly and quickly recognize a number of tag IDs in the reader's field. Unlike the probabilistic anti-collision schemes, a query tree based protocol guarantees to identify all the tags, where the distribution of tag IDs is assumed to be uniform. However, in real implements, the prefix of tag ID is uniquely assigned by the EPCglobal and the remaining part is sequentially given by a company or manufacturer. In this paper, we propose an enhanced M-ary query tree protocol (EMQT), which effectively reduces unnecessary query-response cycles between similar tag IDs using m-bit arbitration and tag expectation. The theoretical analysis and simulation results show that the EMQT significantly outperforms other schemes in terms of identification time, identification efficiency and communications overhead.

Performance Modeling of an EPC Information Service System

  • Kim, So-Jung;Kang, Yong-Shin;Son, Kyung-Won;Lee, Yong-Han;Rhee, Jong-Tae;Hong, Sung-Jo
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.3
    • /
    • pp.285-293
    • /
    • 2010
  • To obtain visible and traceable information from the supply chain, HW/SW standards for the EPC global network, which process electronic product code (EPC) data read from Radio frequency identification (RFID) tags, are regarded as the de facto industry standard. Supply chain participants install information service systems and provide logistics information to partners by following the EPCglobal architecture framework. Although quality of service (QoS) is essential for providing dependable and scalable services as pointed out by Auto-ID Lab, only a few models for the performance analysis of QoS-related work have been developed in the context of EPC information service systems. Specifically, doing so allows alternative design choices to be tested in an easy and cost-effective manner and can highlight potential performance problems in designs long before any construction costs are incurred. Thus, in this study we construct a model of an EPC information service system for the purposes of performance analysis and designing a dependable system. We also develop a set of building blocks for analytical performance models. To illustrate how the model works, we determine the characteristics of an EPC information service system and then select a combination of these proven modeling concepts. We construct a performance model that considers the response time and shows how to derive meaningful performance values. Finally, we compare the analytical results to measurements of the EPC information service system.