• Title/Summary/Keyword: Identification Infrastructure

Search Result 194, Processing Time 0.028 seconds

Long term monitoring of a cable stayed bridge using DuraMote

  • Torbol, Marco;Kim, Sehwan;Shinozuka, Masanobu
    • Smart Structures and Systems
    • /
    • v.11 no.5
    • /
    • pp.453-476
    • /
    • 2013
  • DuraMote is a remote sensing system developed for the "NIST TIP project: next generation SCADA for prevention and mitigation of water system infrastructure disaster". It is designed for supervisory control and data acquisition (SCADA) of ruptures in water pipes. Micro-electro mechanical (MEMS) accelerometers, which record the vibration of the pipe wall, are used detect the ruptures. However, the performance of Duramote cannot be verified directly on a water distribution system because it lacks an acceptable recordable level of ambient vibration. Instead, a long-span cable-stayed bridge is an ideal test-bed to validate the accuracy, the reliability, and the robustness of DuraMote because the bridge has an acceptable level of ambient vibration. The acceleration data recorded on the bridge were used to identify the modal properties of the structure and to verify the performance of DuraMote. During the test period, the bridge was subjected to heavy rain, wind, and a typhoon but the system demonstrates its robustness and durability.

Analyses of Light-weight Protocol for Tag Security in RFID System (RFID 시스템에서의 태그 보안을 위한 경량화 프로토콜의 분석)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2399-2403
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper analyses the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage process, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and the mitigate the risks.

A Framework for Supporting RFID-enabled Business Processes Automation

  • Moon, Mi-Kyeing
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.712-720
    • /
    • 2011
  • Radio frequency identification (RFID) is an established technology and has the potential, in a variety of applications, to significantly reduce cost and improve performance. As RFID-enabled applications will fulfill similar tasks across a range of processes adapted to use the data gained from RFID tags, they can be considered as software products derived from a common infrastructure and assets that capture specific ions in the domain. This paper discusses a framework that supports the development of RFID-enabled applications based on a business process family model (BPFM), explicitly representing both commonalities and variabilities. To develop this framework, common activities are identified from RFID-enabled applications and the variabilities in the common activities are analyzed in detail using variation point concepts. Through this framework, RFID data is preprocessed, and thus, RFID-enabled applications can be developed without having to process RFID data. Sharing a common model and reusing assets to deploy recurrent services may be considered an advantage in terms of economic significance and the overall product quality afforded.

Exploring Smartphone-Based Indoor Navigation: A QR Code Assistance-Based Approach

  • Chirakkal, Vinjohn V;Park, Myungchul;Han, Dong Seog
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.3
    • /
    • pp.173-182
    • /
    • 2015
  • A real-time, Indoor navigation systems utilize ultra-wide band (UWB), radio-frequency identification (RFID) and received signal strength (RSS) techniques that encompass WiFi, FM, mobile communications, and other similar technologies. These systems typically require surplus infrastructure for their implementation, which results in significantly increased costs and complexity. Therefore, as a solution to reduce the level of cost and complexity, an inertial measurement unit (IMU) and quick response (QR) codes are utilized in this paper to facilitate navigation with the assistance of a smartphone. The QR code helps to compensate for errors caused by the pedestrian dead reckoning (PDR) algorithm, thereby providing more accurate localization. The proposed algorithm having IMU in conjunction with QR code shows an accuracy of 0.64 m which is higher than existing indoor navigation techniques.

XML-based Information Management System Supporting RFID/USN Infrastructure Construction (RFID/USN 인프라 구축을 지원하는 XML 기반 정보 관리 시스템)

  • Han Gi-Deok;Cho Yi-Hyon;Kwon Hyuk-Chul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1351-1354
    • /
    • 2006
  • 최근 들어 RFID(Radio Frequency IDentification) 및 USN(Ubiquitous Sensor Network) 기술개발과 응용에 대한 국내외의 관심이 고조되고 있으며, RFID 기술 및 USN기술은 미래 핵심기술로 새로운 시장을 창출할 수 있음은 물론, 모든 산업에 접목하여 새로운 정보화 혁명을 주도할 것으로 전망되고 있다. 본 논문은 RFID Middleware가 구축되었다는 가정 하에 RFID/USN 인프라를 어떻게 구축할 것인가에 대한 연구 및 RFID/USN 기술 중 RFID/USN 인프라 구축을 지원하는 정보 관리 시스템에 대한 소개, 역할 및 시스템의 구조를 설명한다.

  • PDF

Technique for Enhancing Security and Analyses of Vulnerability of RFID Tag security and Protocol (RFID 태그 보안과 프로토콜의 취약점 분석 및 보안성 향상을 위한 기법)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1307-1312
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper proposes a novel practical approach, which are fully conformed to EPCglobal RFID Gen2 standard, for enhancing security of currently used RFID Gen2 tags against the various security threats.

An approach for traffic signal control using RFID sensors

  • Seo, Gang-Do;Cho, Jin-Ho
    • Journal of Sensor Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.236-244
    • /
    • 2008
  • The Korean government is building several futuristic cities, ubiquitous City (u-City), with the latest information technology (IT) infrastructure and "ubiquitous" environment. In the "u-City", Intelligent Transportation System (ITS) will be one of the important services. This study proposed a traffic responsive urban traffic control system applicable in those u-City, using RFID (Radio Frequency Identification) technology to get traffic information. And, we proposed a predictive control model using the real time traffic information achieved from the proposed system. A simulation example is provided to demonstrate the applicability of the proposed system and model.

A Study on the Clinical Study of Periodic Treatment of Endometriosis (자궁내막증의 주기요법 임상 연구에 대한 고찰)

  • Park, Jang-Kyung
    • The Journal of Korean Obstetrics and Gynecology
    • /
    • v.33 no.2
    • /
    • pp.112-123
    • /
    • 2020
  • Objectives: The purpose of this study is to review the research in the cyclic treatment of endometriosis in traditional Korean medicine. Methods: By October 2019, the relevant studies on the periodic therapy of endometriosis were searched using the Chinese National Knowledge Infrastructure Database (CNKI) and Oriental Medicine Advanced Searching Integrated System (OASIS). Results: Finally, three Randomized controlled trials, one case study, two clinical observational studies were selected. In all studies, herbal medicine periodic therapy has been effective in improving symptoms of endometriosis. Blood-activating and stasis-dispelling medicinal were the most commonly used before menstruation and during menstruation, and tonifying and replenishing medicinal were the most commonly used after menstruation. According to the one study, which reported safety, herbal medicine was safe. Conclusions: Although limited due to a lack of literature, periodic therapy is effective in improving endometriosis related symptoms and preventing recurrence. A well-designed study and experimental studies for the identification of the mechanism are needed.

A Practical Approach for Enhancing Security of RFID Tag (RFID 태그의 보안성을 향상시키기 위한 실제적인 접근 방법)

  • Ko, You-Wei;Nam, Jeon-Woo;Park, Yeong-Beom;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.473-475
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper proposes a novel practical approach, which are fully conformed to EPCglobal RFID Gen2 standard, for enhancing security of currently used RFID Gen2 tags against the various security threats.

  • PDF

Design and Implementation of Security Integration Framework for Secure Mobile RFID Service Network (안전한 모바일 RFID 서비스 네트워크를 위한 보안 통합 프레임워크의 설계 및 구현)

  • Park, Nam-Je;Chung, Kyo-Il
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.63-64
    • /
    • 2008
  • The mobile RFID (Radio Frequency Identification) is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable services to user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. However, there are an increasing number of concerns, and even some resistances, related to consumer tracking and profiling using RFID technology. Therefore, in this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID services which complies with the Korea's mobile RFID forum standard.

  • PDF