• Title/Summary/Keyword: Id

Search Result 2,853, Processing Time 0.029 seconds

Efficient Tag Authentication Scheme using Tag ID Identification Bits in RFID Environment (RFID 환경에서 태그 ID의 식별 비트를 이용한 효율적인 태그 인증 기법)

  • Jang, Bong-Im;Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.195-202
    • /
    • 2011
  • RFID(Radio Frequency IDentification) is a system to identify objects and its usage is being extended to distribution, healthcare, and air&port etc. RFID is a contactless system environment, and reducing tag authentication time is important because multiple tags are identified at the same time. Studies about RFID system so far is, however, mostly to improve security vulnerability in the tag authentication process. Therefore, this paper suggests an efficient scheme to decrease the time of tag authentication which is also safe for the security of tag authentication process. The proposed scheme cuts down on the tag ID search time because it searches only the classified relevant ID in the database, which is one of many components of RFID system, by using identification bits for tag ID search. Consequently, the suggested scheme decreases process time for tag ID authentication by reducing the processing time and the load of the database. It also brings performance improvement of RFID system as it improves the energy applicability of passive tag.

The Design of Fuzzy P+ID Controller for Brushless DC Motor Speed Control (BLDC 전동기의 속도 제어를 위한 퍼지 P+ID 제어기 설계)

  • Kim, Young-Sik;Kim, Sung-Joong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.5
    • /
    • pp.823-829
    • /
    • 2006
  • In this paper presents approaches to the design of a hybrid fuzzy logic proportional plus conventional integral- derivative(fuzzy P+ID) controller in an incremental form. This controller is constructed by using an incremental fuzzy logic controller in place of the proportional term in a conventional PID controller. The PID type controller has been widely used in industrial application due to its simply control structure, easy of design, and inexpensive cost. However, control performance of the PID type controller suffers greatly from high uncertainty and nonlinearity of the system, large disturbances and so on. This paper presents a hybrid fuzzy logic proportional plus conventional integral derivative controller In comparison with a conventional PID controller, only one additional parameter has to be adjusted to tune the Fuzzy P+ID controller. In this case, the stability of a system remains unchanged after the PID controller is replaced by the Fuzzy P+ID controller without modifying the original controller parameters. Finally, the proposed hybrid Fuzzy P+ID controller is applied to BLDC motor drive. Simulation results demonstrated that the control performance of the proposed controller is better than that of the conventional controller.

  • PDF

Long Distance Transmission System of Tag's ID in RFID System (전자인식 시스템에서 택 ID의 원거리 전송 시스템)

  • Kim, Dong-Hun;Jo, Hyeong-Guk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.63-67
    • /
    • 2009
  • In RFID system, Tag's Identification data is processed in host computer by application program. Example of application program is parking administration program, library state program etc.. Tag's ID that is recognized in reader is inputted to the Host computer. Application program of computer searches data in DB of computer such as Tag ID. After finding the same ID, host computer send to control command to driver H/W in accordance with application purpose. But, It need to confirm in long distance whether achievement process is acted normally. There will be the 2 methods, when we monitors the process in long distance. One is wired monitoring system, another is wireless monitoring system. Among wire method, internet communication network is useful. RFID system manufacture first in this treatise. RFID system Embody using EM4095 chip that is doing 125KHz by carrier wave. Tag's characteristic ID is sent in remote place through module that use W3100A chip. This system Manufacture, and data send-receive confirmed using simple application program. Reception confirm by result, and pictures show by whole system and each part. And a control program explained of each part.

  • PDF

Antimutagenic Activities of 24 Synthetic Flavones with The Salmonella Microsomal Assay

  • Laget, M.;De Meo, M.;Wallet, J.C.;Gaydou, E.M.;Guiraud, H.;Dumenil, G.
    • Archives of Pharmacal Research
    • /
    • v.18 no.6
    • /
    • pp.415-422
    • /
    • 1995
  • Twenty-four flavones were synthesized with various hydroxyl and/or methoxyl groups on A and B rings. Their antimutagenic properties were evaluated against ben:w(a)pyrene (BaP) and a pool of mutagenic urine concentrate (U) using a modified liquid incubation method of Ames test. The tester strain was Salmonella typhimurium TA98+S9 Mix. The antimutagenic activities were calculated by non linear regression analysis and the doses of flavones (in nmoles) required for a 50% reduction of induced revertants with BaP and U were defined as the inhibition doses (TEX>$ID_{508}{\;}and{\;}ID_{508}$ respectively). Seventeen flavones possessed significant antimutagenic activity against BaP. $ID_{508}$ ranged from 15.1 nmoles (F22) to 1000.6 nmoles (F13). Eighteen f1avones showed significant antimutagenic activity against U. $ID_{50U}$ ranged from 23.5 nmoles (F22) to 354.6 nmoles (F3). The 2',3',4'-trihydroxyflavone (F22, $ID_{508}=15.1$ nmoles, $ID_{50U}=23.5$ nmoles) and the 2',3',4',7-tetrahydroxyflavone (F20, $ID_{508}=37.8$ nmoles; $ID_{50U}=62.3$ nmoles) had antimutagenic activities similar to those of chlorophyllin ($ID_{508}=19.6$ nmoles and $ID_{50U}=44.2$ nmoles) and were evaluated against B(alP 7,8-dihydrodiol-9,10-epoxide. Against this last mutagen, the flavones which included three OH in B ring showed the highest activity and this property seemed independent of the substituent groups on A ring.

  • PDF

Induction of Apoptosis in Human Cancer Cells with Extracts of Taraxacum coreanum, Youngia sonchifolia and Ixeris dentate (흰민들레, 고들빼기, 씀바귀 추출물의 암세포 증식 억제 효과)

  • Shin, Seong-Ah;Lee, Hae-Nim;Choo, Gang-Sik;Kim, Hyeong-Jin;Park, Byung-Kwon;Kim, Byeong-Soo;Jung, Ji-Youn
    • Journal of Food Hygiene and Safety
    • /
    • v.31 no.1
    • /
    • pp.51-58
    • /
    • 2016
  • This research examined the effects of Compositae extract on the inhibition of proliferation and apoptosis in human breast and human gastric cancer cells. Compositae extracts which is used in the experiment are Taraxacum coreanum (TC), Youngia sonchifolia (YS) and Ixeris dentata (ID). The proliferation of SK-BR-3, MDA-MB-231 and AGS cells were investigated by MTT assay. ID and YS extracts inhibited proliferation of SK-BR-3, MDA-MB-231 and AGS cells in a dose-dependent manner, but TC have barely affected. In addition, the most effective extract was ID. To assess the apoptosis of ID extract, the nuclei of human cancer cells were stained with DAPI solution respectively. Chromatin condensation, indicated apoptosis, was increased in a dose-dependent manner. We investigated change of ID extract-induced apoptosis proteins on human cancer cells by western blot analysis. The level of Bcl-2 decreased, whereas the level of Bax, cleaved-PARP increased in dose-dependent manner compared with non-treatment. Also Bax/Bcl-2 ratio, which is used in clinical indicator of apoptosis, was increased at ID extract treatment group compared with non-treatment. Moreover the Bax/Bcl-2 ratio of MDA-MB-231 cell was significantly increased as against SK-BR-3, AGS cells. These results indicated that ID extract have anti-proliferation effect better than YS or TC, and induced apoptosis in human breast cancer MDA-MB-231 cell better than human breast cancer SK-BR-3 cell, human gastric cancer. Even if further research is needed, ID can be developed as a chemopreventive or therapeutic agent of breast cancer.

A Study of RF Watermark Backward Compatibility under Various Channel Environments (다양한 채널환경 하에서의 RF 워터마크 역호환성 연구)

  • Kim, Jeong-Chang;Park, Sung-Ik;Choi, Dae-Won;Lim, Hyoung-Soo;Kim, Heung-Mook
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.8
    • /
    • pp.99-107
    • /
    • 2010
  • In a single frequency network (SFN) for Advanced Television Systems Committee (ATSC) terrestrial digital television (DTV) system, the interferences induced by the multiple transmitters and/or repeaters using the same frequency are inevitable. Since the presence of interferences results in performance degradation of the SFN, it is crucial to manipulate the interferences by adjusting the transmit power and timing of each transmitter and repeater. In the ATSC terrestrial DTV system, in order to facilitate the interference manipulation process, a transmitter identification (TxID) signal which is uniquely embedded in the signal to be transmitted from each transmitter and repeater is recommended. Even though the injection level of the TxID signal is much lower than the DTV signal, the TxID signal injection infects the DTV signal. Hence, the effect of the TxID signal on the DTV signal must be investigated before deployment. In this paper, the effect of the TxID signal on the performance of legacy DTV receivers under additive white Gaussian noise and multipath channel environments is investigated not only with computer simulation but also with laboratory and field tests. The test results show that the average threshold of visibility degradation of the legacy DTV receivers due to the TxID signal injection is less than 0.2 dB at the TxID injection level of -30 dB.

Design of user authentication mechanism for open mobile web services using OpenID (개방형 모바일 웹 서비스를 위한 OpenID를 이용한 사용자 인증 메커니즘의 설계)

  • Bae, Joon-Hyun;Kim, Sang-Wook
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.35-39
    • /
    • 2007
  • OpenID는 웹 서비스를 위한 사용자 중심의 분산형 인증 메커니즘을 제공한다. OpenID를 이용하면 기존의 아이디와 패스워드를 이용한 인증방법보다 더 편리한 회원등록과 로그인 기능을 제공 할 수 있다. 본 논문에서는 OpenID를 이용하여 모바일 웹 환경에서의 사용자 인증 메커니즘을 설계한다. 먼저, 이동통신 망과 무선인터넷에서의 사용자 인증기술에 대해서 분석하고, OpenID를 이용한 개선된 모바일 웹 사용자 인증 메커니즘을 제안한다. 제안하는 메커니즘의 목표는 모바일 웹 사용자에게는 보다 효율적인 회원등록과 로그인 기능을 제공하고, 모바일 웹 서비스 제공자에게는 좀 더 신뢰성 있는 사용자 인증 수단을 제공하는 데 있다.

  • PDF

A Study on Privacy Enhancing Technologies (개인정보보호기술에 관한 연구)

  • Park, Ik-Su;Yang, Jin-Hee;Seo, Jea-Hyun;Oh, Byeong-Kyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1076-1078
    • /
    • 2007
  • 일반적으로 사용자 ID는 인터넷의 여러 사이트에 분산, 중복 저장되어 있으며, 사용자 ID의 증가와 관리의 불편함, 개인정보 유출로 인한 프라이버시 문제가 발생하고 있다. 최근 개인정보보호를 위한 기술로 ID관리시스템 개발이 진행되고 있다. ID관리시스템은 웹 사이트에 한번 회원 등록 후, 하나의 ID로 한번의 로그인을 통해 모든 사이트의 서비스들을 이용할 수 있도록 해주는 역할이 가능하다. 본 논문에서는 ID관리시스템의 개념과 기술 동향에 관하여 살펴본다.

  • PDF

A Naming Technique of the MPEG-4 Object for the Quick Search of the Scene Graph (씬 그래프의 빠른 탐색을 위한 MPEG-4 객체 Naming 기법)

  • 김남영;이숙영;김상욱
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10d
    • /
    • pp.208-210
    • /
    • 2002
  • 재생기에서 MP4 파일을 재생하기 위해서는 Drawing 정보와 Routing 정보가 필요하다. 기존의 저작도구에서의 객체 Naming은 그 객체와는 상관없이 단순히 문자열과 숫자의 조합으로 되어 있고 실제 화면상에 기술되는 객체의 ID값을 부여하는 방법이었다. 객체 Naming을 구현하는 객체 ID 설정이 이러한 방법이었기 때문에 재생기에서 객체 정보를 구하려면 Scene 그래프를 반복해서 검색하는 load가 발생한다. 본 논문에서는 이러한 load를 줄이기 위해서 비트 연산을 이용한 각 객체의 ID를 부여함으로써 각 객체에 속하는 Attribute의 ID가 자신의 실제 객체의 ID를 추론할 수 있는 방법으로 객체에 대한 Naming을 구현하였다. 이러한 객체 Naming 기법으로 설정된 객체의 ID값은 비트 연산과 시프트 연산을 이용해서 객체 정보를 구할 수 있기 때문에 Scene 그래프 탐색 load를 줄일 수 있다.

  • PDF

An Access Control Based Privacy Protection Model in ID Management System (ID관리시스템의 접근통제기반 프라이버시 보안모델)

  • Choi Hyang-Chang;Noh Bong-Nam;Lee Hyung-Hyo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.1-16
    • /
    • 2006
  • The vulnerability of privacy in the Identity Management System (IMS) is the most pressing concern of ordinary users. Uncertainty about privacy keeps many users away from utilization of IMS. Therefore, this paper proposes an access-control oriented privacy model for IMS. The proposed model protects privacy using access control techniques with privacy policies in a single circle of trust. We address characteristics of the components of for the proposed model and describe access control procedures. After that, we show the architecture of privacy enforcement and XML-based schema for privacy policies.

  • PDF