• Title/Summary/Keyword: Location of Tags

Search Result 125, Processing Time 0.023 seconds

A Study on the EPCIS Event Data Modeling and Simulation Test (EPCIS Event 데이터 모델링과 시뮬레이션 검증 연구)

  • Li, Zhong-Shi;Lee, Tae-Yun;Piao, Xue-Hua;Da, Dan;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.2
    • /
    • pp.137-144
    • /
    • 2009
  • EPCIS(EPC Information Services) system is a core component of EPCglobal Architecture Framework offering information of the freights, the time of awareness and the location of awareness on the EPCglobal Network. The role of EPCIS is to exchange information based on EPC. There are four kinds of event data which are object event data, aggregation event data, quantity event data, and transaction event data. These EPCIS events data are stored and managed in EPCIS repository. This study suggest the quantitative modeling about total number of EPCIS event data under the assumption to aware the RFID tags of items, cases(boxes), vehicles(carriers, forklifts, auto guided vehicles, rolltainers) at a time on the reading points. We also estimate the number of created EPCIS event data by the suggested quantitative modeling under scenario of process in the integrated logistics center based on RFID system And this study compare the TO-BE model with the AS-IS model about the total sizes of created EPCIS event data using the simulation, in which we suggested the TO-BE model as the development of the repository by skipping the overlapped records.

Use of DNA-Specific Anthraquinone Dyes to Directly Reveal Cytoplasmic and Nuclear Boundaries in Live and Fixed Cells

  • Edward, Roy
    • Molecules and Cells
    • /
    • v.27 no.4
    • /
    • pp.391-396
    • /
    • 2009
  • Image-based, high-content screening assays demand solutions for image segmentation and cellular compartment encoding to track critical events - for example those reported by GFP fusions within mitosis, signalling pathways and protein translocations. To meet this need, a series of nuclear/cytoplasmic discriminating probes have been developed: DRAQ5$^{TM}$ and CyTRAK Orange$^{TM}$. These are spectrally compatible with GFP reporters offering new solutions in imaging and cytometry. At their most fundamental they provide a convenient fluorescent emission signature which is spectrally separated from the commonly used reporter proteins (e.g. eGFP, YFP, mRFP) and fluorescent tags such as Alexafluor 488, fluorescein and Cy2. Additionally, they do not excite in the UV and thus avoid the complications of compound UV-autofluorescence in drug discovery whilst limiting the impact of background sample autofluorescence. They provide a convenient means of stoichiometrically labelling cell nuclei in live cells without the aid of DMSO and can equally be used for fixed cells. Further developments have permitted the simultaneous and differential labelling of both nuclear and cytoplasmic compartments in live and fixed cells to clearly render the precise location of cell boundaries which may be beneficial for quantitative expression measurements, cell-cell interactions and most recently compound in vitro toxicology testing.

The Design and Implementation of an English Situated Learning System based on RFID (RFID 기반 영어 상황 학습 시스템의 설계 및 구현)

  • Yang, Kyoung Mi;Kim, Cheol Min;Kim, Seong Baeg
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.6
    • /
    • pp.65-78
    • /
    • 2006
  • Recently, there has been much research to develope and apply RFID technology, which has a kcy role in the upcoming ubiquitous society, in many fields such as physical distribution, traffic control, medical service, and so on. However, there has been little research on a ubiquitous education or learning including 'u-Campuses' and 'u-Libraries'. Based on the characteristics of RFlD, this paper proposes a system for English learning required in globalization age. RFID tags and sensors utilize wireless communications to track the location and status information of the user to deliver English situated learning services. The current RFID-based system should use quite a different rniddleware, compared with a general-purpose middleware on server or desktop. The RFID system is used on a mobile PDA and consists of essential APIs such as reader and tag control, queue, and filter management.

  • PDF

RFID-based Shortest Time Algorithm Line Tracer (RFID 기반 최단시간 알고리즘 라인트레이서)

  • Cheol-Min, Kim;Hee-Young, Cho;Tae-Sung, Yun;Ho-Jun, Shin;Hyoung-Keun, Park
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1221-1228
    • /
    • 2022
  • With the development of modern technology, the use of unmanned automation equipment that can replace humans in logistics and industrial sites is increasing. The technology of one such automation facility, the Unmanned Carrier (AGV), includes Line Tracing, which allows you to recognize a line through infrared sensors and drive a predetermined route. In this paper, the shortest time algorithm using Arduino is configured in the line tracing technology to enable efficient driving. It is also designed to collect location and time information using RFID tags.

Mechanism of RFID Authentication for u-Vehicle (u-Vehicle 환경에 적합한 RFID 인증 메커니즘)

  • Rhee, Yoon-Jung;Kim, Do-Hyeon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.66-73
    • /
    • 2008
  • The concept of u-Vehicle is a technological model that people try to build the ubiquitous world in the car which moves, by using the RFID technology as well as the telematics service based on the location. RFID is weak on the point of information security because RFID has possibility for being abused such as chasing, counterfeiting, and invading personal privacy. RFID's tags use a weak cryptographic algorithm. This paper presents the vulnerabilities of information security under u-Vehicle environments. To solve that, we propose a mechanism enhancing RFID tag's security but with low cost by reducing the number of mutual authentication stages and using the hash function.

A USN Based Mobile Object Tracking System for the Prevention of Missing Child (미아방지를 위한 USN 기반 보호대상 이동체 위치확인 시스템)

  • Cha, Maeng-Q;Jung, Dae-Kyo;Kim, Yoon-Kee;Chong, Hak-Jin
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.453-463
    • /
    • 2008
  • The missing child problem is no more a personal problem. It became a social problem that all parents must consider. To this, this study applies USN/RFID technology integrated with GIS for the prevention of missing child. Although RFID is not designed for location sensing, but now it is regarded as a device to facilitate real time location awareness. Such advantages of RFID can be integrated with 4S(GIS/GPS/LBS/GNSS) achieving much synergy effects. In order to prevent kidnapping and missing child, it is necessary to provide a missing child preventing system using a ubiquitous computing system. Therefore, the missing child preventing system has been developed using high-tech such as RFID, GPS network, CCTV, and mobile communication. The effectiveness of the missing child prevention system can be improved through an accurate location tracking technology. This study propose and test a location sensing system using the active RFID tags. This study verifies technical applied service, and presents a system configuration model. Finally, this paper confirms missing child prevention system utilization possibility.

RFID Tag Search Protocol Preserving Privacy of Reader Holders (이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜)

  • Chun, Ji-Young;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.59-69
    • /
    • 2009
  • RFID tag search system which is used to find a specific tag has an application such as asset management, supply chain, and this search scheme has been given much attention so far. In RFID tag search system, especially, mobility of the reader is important in order to search tags. Therefore, even though the handheld reader cannot connect with the central database because of unreliable wireless connection or remote location, handheld reader should search the specific tag without help of the central database. In addition, in RFID tag search system, users hold not the tag but the reader, the privacy of users should be considered. Since the signal strength of the reader is stronger than that of the tag, the privacy of the reader holder is very important. Recently, in order to solve these problems, a number of RFID tag search schemes have been proposed. However, since these schemes did not consider the privacy of reader holders, there are serious privacy breaches of reader holders. In this paper, we propose efficient RFID tag search protocol for passive tags. Our proposed scheme preserves the privacy of reader holders.

A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 태그의 인증과 관리에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.81-94
    • /
    • 2006
  • This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID Tag's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID Tag to be applied in the ubiquitous-computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the Passive-tag-Performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive-tag-based networks as the authentication level is established based on the secure authentication of each tag and the service that the tag delivers in the passive-tag-based networks and as the same service and authentication levels are applied, and the active-tag-based network system proposed herein is not merely a security service against illegal RFID tags by performing a current-location and service registration process after the secure authentication process of the active RFID tag, but is also a secure protocol for single and group services, is proposed in this study.

A Storage and Computation Efficient RFID Distance Bounding Protocol (저장 공간 및 연산 효율적인 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1350-1359
    • /
    • 2010
  • Recently many researchers have been proved that general RFID system for proximity authentication is vulnerable to various location-based relay attacks such as distance fraud, mafia fraud and terrorist fraud attacks. The distance-bounding protocol is used to prevent the relay attacks by measuring the round trip time of single challenge-response bit. In 2008, Munilla and Peinado proposed an improved distance-bounding protocol applying void-challenge technique based on Hancke-Kuhn's protocol. Compare with Hancke-Kuhn's protocol, Munilla and Peinado's protocol is more secure because the success probability of an adversary has (5/8)n. However, Munilla and Peinado's protocol is inefficient for low-cost passive RFID tags because it requires large storage space and many hash function computations. Thus, this paper proposes a new RFID distance-bounding protocol for low-cost passive RFID tags that can be reduced the storage space and hash function computations. As a result, the proposed distance-bounding protocol not only can provide both storage space efficiency and computational efficiency, but also can provide strong security against the relay attacks because the adversary's success probability can be reduced by $(5/8)^n$.

Real-Time Construction Resource Monitoring using RFID/USN Inter-working System (RFID/USN 연동 시스템을 활용한 건설자원 실시간 모니터링 시스템)

  • Ryu, Jeoung-Pil;Kim, Hyoung-Kwan;Kim, Chang-Yoon;Kim, Chang-Wan;Han, Seung-Heon;Kim, Moon-Kyum
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.90-94
    • /
    • 2007
  • Location tracking automation of resources in construction industry is one of the most important procedures to improve construction project performance and reduce the period of construction. Recently, location tracking technologies have proven to be effective in tracking construction materials and equipment in real time through the instrumentality of RFID (Radio Frequency Identification). By using wireless communication and inter-working system between RFID and USN, it is possible that construction engineers receive the location information of construction resources without additional efforts that move the RFID reader to read tags periodically. In the inter-working system, RFID reader delivers the acquired materials information to sensor node which is connected by serial interface. Then sensor node transmits the received data to the data aggregation terminal that is a sink node. The data aggregation terminal can transmit collected data to construction manager who is out of construction site using infrastructure such as CDMA(Code Division Multiple Access) network. The combination model of the two system and field test scenarios are presented in this paper.

  • PDF