• Title/Summary/Keyword: Electronic Tag

Search Result 236, Processing Time 0.029 seconds

Interference Analysis of RFID Gen-2 System Considering Both PHY and MAC Layers (PHY/MAC 계층을 모두 고려한 RFID Gen-2 시스템의 간섭 분석)

  • Yoon, Hyun-Goo;Choi, Sun-Woong;Jang, Byung-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.7
    • /
    • pp.752-760
    • /
    • 2010
  • This paper investigates the performance of EPCglobal Generation-2(Gen-2) radio frequency identification(RFID) protocol under reader-to-reader interfering environments. We establish a modified discrete-time Markov chain(DTMC) model for the Gen-2 and accordingly obtain quantitative results of query success rate(QSR) and tag identification speed (TIS). Extensive simulations validate our theoretical analysis and demonstrate that the number of tags over 100 has little impact on the performance. TIS linearly decreases by 10 tags/sec/reader as the number of interfering readers increases. Our model for Gen-2 protocol is also useful to study the performance of other RFID protocols.

A Design of Data Model for Electronic Tag Information Processing (전자태그 정보 처리를 위한 데이터 모델 설계)

  • Chang, Jung-Soo;Song, Jong-Chul;Ko, Gwang-San;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.763-766
    • /
    • 2005
  • Ubiquitous Computing owes Internet and development of computer network and appeared. RFID (Radio frequency Identification) technology is noted by point technology to realize this. However, PML that present in Auto-lD Center is defined point part to describe information of object, and necessary part is to use defining extension separately in actuality application. So that can define object type that can be used for electron tag data processing in RFID application service because do fetters to Auto-lD Center's PML Core in this treatise hereupon and apply in physical distribution circulation service field, designed object information data model.

  • PDF

An Implementation of Smart Laundry Management System Using Wrieless RFID Reader (무선 RFID 리더기를 이용한 스마트 세탁물 관리 시스템 개발)

  • Lee, Seung-Joon;Lee, Chang-Won;Nghia, Troung Van;Kim, Joo-Woong;Jung, Kyung-Kwon;Eom, Ki-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.811-814
    • /
    • 2011
  • This paper presents smart laundry management system using wireless Radio Frequnecy Identification (RFID) reader for efficient managing a large amount of laundry and clothing. The proposed system is comprised of wireless RFID hanger, base module connected on PC, and server system. The wireless RFID hanger with RFID reader read RFID tag attached on clothes and transmit tag information using wireless communication. The server system manage customers and his clothing using Database (DB) and display the information on the web page and smart phone devices. Since the proposed system operates with battery, we can evaluate its lifetime to measure current consumption. The designed system can be utilized to manage quantities of clothes and also it will be a good service to improve efficiency of laundry process.

  • PDF

Architecture of RFID Application Services for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 RFID 응용 서비스 아키텍처에 관한 연구)

  • Lee Sang-Jo;Cho Tae-Beom;Yunn Hwa-Mook;Kim Chang-Su;Jung Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.1011-1014
    • /
    • 2006
  • Recently, The Ubiquitous Computing which appears by issue in the latest IT field is actualized possibility and interest intensively becomes in many disciplines through rapid advancement of the network and the semiconductor. RFID is a base technology of the Ubiquitous Computing and it is technology to identifies information of the electronic tag which attaches in the object. and it guides the commercial business anger of Ubiquitous Computing. But currently, most of RFID research is becoming intensively in hardware field as tag and leader, whereas the research of software field relativy is insufficient. In this paper, we compared and analyzed architecture of existing which uses the RFID to rise point of Ubiquitous Computing then we complemented the problem point which is analyzed and proposed a new architecture to provides an intelligence application service.

  • PDF

Tracking of Yellowtail Seriola quinqueradiata Migration Using Pop-up Satellite Archival Tag (PSAT) and Oceanic Environments Data (위성전자표지와 해양환경자료를 이용한 방어(Seriola quinqueradiata) 이동경로 추적 연구)

  • Kim, Changsin;Yang, Jigwan;Kang, Sujin;Lee, Seung-Jong;Kang, Sukyung
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.54 no.5
    • /
    • pp.787-797
    • /
    • 2021
  • Yellowtail Seriola quinqueradiata tagged with a Pop-up Satellite Archival Tag (PSAT) was released off the coast of near the Moseulpo, Jeju Island and the ecological data during about 40 days was obtained. However, it is difficult to determine the spatial location of underwater ecological data. To improve the accuracy of estimating the Yellowtail migration route using temperature, suitable background field of the oceanic environment data was evaluated and used for input data. After developing of the tracking algorithm for migration route estimation, three experiment cases were estimated with ecological data among the surface layer, the mixed layer, and the whole water column. All tracking experiments move from western to eastern Jeju Island. Additionally, tracking experiment using 3D ocean numerical model reveal that it is possible to estimate the migration route using the fish ecological data of the entire water column. Therefore, using a large number of ecological data and a high-accuracy ocean numerical model to estimate the migration route seems to be a way to increase the accuracy of the tracking experiment. Moreover, the tracking algorithm of this study can be applied to small pelagic fishery using small archival electronic tags to track the migration route.

A Study on RFID Privacy Protection in Insecure Channel (안전하지 않은 채널에서의 RFID 프라이버시 보호에 관한 연구)

  • Park Jang-Su;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.77-86
    • /
    • 2006
  • As a core technology in the ubiquitous environment, RFID (Radio Frequency Identification) technology takes an important role. RFID technology provides various information about objects or surrounding environment by attaching a small electronic tag on the object, thus, it means the remote control recognition technology. However, the problems which never happened before can be generated on the point of security and privacy due to the feature that RFID technology can recognize the object without any physical contact. In order to solve these problems, many studies for the RFID recognition technology are going on the progress. The currently running study is the secure communication channel between database and reader applying the recognition technology in the insecure communication channel between reader and tag. But, the purpose of this paper is to settle a privacy problem, which is insecurity of communication between database and reader channel by suggesting providing a user with authentication protocol in order to give information to an authorized entity.

Chip Impedance Evaluation Method for UHF RFID Transponder ICs over Absorbed Input Power

  • Yang, Jeen-Mo;Yeo, Jun-Ho
    • ETRI Journal
    • /
    • v.32 no.6
    • /
    • pp.969-971
    • /
    • 2010
  • Based on a de-embedding technique, a new method is proposed which is capable of evaluating chip impedance behavior over absorbed power in flip-chip bonded UHF radio frequency identification transponder ICs. For the de-embedding, four compact co-planar test fixtures, an equivalent circuit for the fixtures, and a parameter extraction procedure for the circuit are developed. The fixtures are designed such that the chip can absorb as much power as possible from a power source without radiating appreciable power. Experimental results show that the proposed modeling method is accurate and produces reliable chip impedance values related with absorbed power.

KITSAT-3 Image Product Generation System

  • Shin, Dong-Seok;Choi, Wook-Hyun;Kwak, Sung-Hee;Kim, Tag-Gon
    • Proceedings of the KSRS Conference
    • /
    • 1999.11a
    • /
    • pp.43-47
    • /
    • 1999
  • In this paper, we describe the configuration of the KITSAT-3 image data receiving, archiving, processing and distribution system in operation. Following the low-cost and software-based design concept, the whole system is composed of three PCs : two for data receiving, archiving and processing which provide a full dual-redundant configuration and one for image catalog browsing which can be accessed by public users. Except that receiving and archiving PCs have serial data ingest boards plugged in, they are configured by general peripherals. This basic and simple hardware configuration made it possible to show that a very low cost system can support a full ground operation for the utilization of high-resolution satellite image data.

  • PDF

The Development of a Highly Portable and Low Cost SPOT Image Receiving System

  • Choi, Wook-Hyun;Shin, Dong-Seok;Kim, Tag-Gon
    • Proceedings of the KSRS Conference
    • /
    • 1999.11a
    • /
    • pp.25-30
    • /
    • 1999
  • This paper covers the development of a highly portable and low cost SPOT image data receiving system. We followed two design approaches. One is the software-based approach by which most of the real-time processing is handled by software. With the complete software-based design, it is simple to add a function for receiving any additional satellite data. Satellite-specific format handlers including error correction, decompression and decryption can easily be accommodated. On the other approach. we used a general hardware platform, IBM-PC and a low cost SCSI RAID (Redundant Away of Independent Disks), and therefore, we can make a low cost system.

  • PDF

Performance Modeling and Analysis of ATM-based Network System Using DEVS Methodology

  • Lee, Kyon-Ho;Kim, Tag-Gog;Lee, Joon-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1279-1288
    • /
    • 1999
  • DEVSim++ is a C++ based, object-oriented modeling/simulation environment which realizes the hierarchical, modular DEVS formalism for discrete event systems specification. The paper describes a methodology for performance modeling and analysis of an ATM-based network system within the DEVSim++ environment. The methodology develops performance models for the system using the DEVS framework and implement the models in C++. Performance indices measured are the length of queues located at connection of the system and cell waiting times with respect to QoS grades for a network bandwidth of 155 Mbps.

  • PDF