• Title/Summary/Keyword: RFID 성과

Search Result 1,053, Processing Time 0.031 seconds

A Study on Optimized Decision Model for Transfer Crane Operation in Container Terminal (컨테이너터미널 트랜스퍼 크레인의 배정 및 이동경로 최적화 모델)

  • Shin, Jeong-Hoon;Yu, Song-Jin;Chang, Myung-Hee
    • Journal of Navigation and Port Research
    • /
    • v.32 no.6
    • /
    • pp.465-471
    • /
    • 2008
  • As the excessive competition between container terminals has been deepening, not only productivity, but also cost economic of the terminals has been raised. With regard to this, the competitiveness of the terminals is limited because of inefficiency operation of transfer crane(T/C) which needs large amount of energy consumption. Therefore, it is possible that the improvement in the T/C operation leads to saving cost for resources and energy as well as increasing the productivity of the terminals. This study provides 'the K-Means Clustering based Optimized Decision Model for Transfer Crane Operation', referring to 'RFID & RTLS based Port Logistics Initiative' of Ministry of Land, Transportation and Maritime Affairs and estimates the efficiency through simulating.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

Efficient Pseudo Random Functions for the e-seal Protection Protocol (e-seal 보안 프로토콜을 위한 효율적인 Pseudo Random Function)

  • Min Jung-Ki;Kang Seok-Hun;Chung Sang-Hwa;Kim Dong-Kyue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.274-276
    • /
    • 2006
  • e-seal은 RFID(Radio Frequency IDentification) 기술을 사용하여 원격에서 자동으로 봉인상태를 확인할 수 있는 컨테이너 봉인 장치를 말한다. RFID의 특징상 반도체 칩에 기록된 정보를 제 삼자가 쉽게 판독 및 변조할 수 있다는 취약점으로 인하여 활성화되지 못하고 있는 실정이다. ISO에서는 RFID의 취약점을 보안하기 위한 표준작업(ISO 18185)을 진행 중이다. 이 중, ISO 18185-4는 e-seal에 저장되는 자료나 리더와의 RF통신에서 데이터 보호를 위한 표준이다. 이와 관련된 연구로는 인증 프로토콜과 ISO 18185-4를 위한 보고서로 제출된 보안 프로토콜이 있다. 제안된 e-seal 보안 프로토콜을 적용하기 위해서는 e-seal과 리더 간의 데이터를 암/복호화할 키가 필요하지만, 키 서버를 통해 전달받은 마스터 키를 데이터 암/복호화 키로 바로 사용하는 것은 보안 상의 문제점을 야기할 수 있기 때문에 PRF(Pseudo Random Function)을 이용하여 마스터 키로부터 MTK(Mutual Transient Key)를 유도하고, MTK를 암/복호화 키로 사용해야 한다. 기존의 PRF는 일방향 해시 함수(MD5, SHA 등)를 기반으로 하는 HMAC[2. 3]을 일반적으로 사용하였다. 그러나 일방향 해시 함수는 e-seal과 같은 제한된 자원을 갖는 환경에 적합하지 않다. 따라서, 본 논문에서는 e-seal 보안 프로토콜을 위한 효율적인 PRF을 제안한다. 기존의 일방향 해시 함수 기반이 아닌 블록 암호화 알고리즘을 기반으로 하는 MAC을 이용하여 PRF을 보다 효율적으로 구현하였고, 블록 암호화 알고리즘은 AES를 선택 합성체 $GF((2^4)^2)$을 통해 하드웨어 모듈을 최적화 하였다. AES를 기반으로 하는 MAC은 HMAC에 비해 면적 및 처리율에서 뛰어난 결과를 보여주었다.<0.01).이상의 연구 결과, cook-chill생산 시 녹차 추출물의 첨가가 미생물적 품질유지에 효과가 있다고 사료되는 바 본 연구결과를 기초로 급식소에서 음식 생산 시 녹차 추출물 및 천연 항균성 물질 첨가에 따른 미생물적 품질 및 관능적 품질검사를 통한 레시피 개발에 관한 지속적인 연구가 수행되어야 하겠다.다.다리다보니 점심시간을 활용할 수 없게 되는 문제점에 대한 재검토가 필요하다. 따라서 차후 학교급식의 안전성 확보를 위한 급식환경 개선의 일환으로 식당공간 확보 시 신속한 시간 내에 급식이 가능하도록 넓은 공간과 쾌적한 환경의 식당 조성에 대해 관심을 기울여야 할 것으로 사료된다. 이상 여부를 반영하는 임상증상의 빈도가 높은 청소년기 남녀 중학생의 경우 아침과 저녁의 결식빈도 및 외식과 간식의 빈도가 높았고, 아침식사의 질과 체형만족도가 낮은 것으로 나타나 청소년의 건강과 식습관 및 체형만족도가 상호 관련성이 높은 것으로 나타났다. 따라서 본 연구 결과는 성장기 청소년의 건강 유지를 위하여 바람직한 식습관의 중요성을 재인식할 수 있었으며, 올바른 식습관 확립을 위한 영양교육의 중요성이 재확인되었다.경제적일 것으로 판단된다.er 90 % of good relative dynamic modulus of elasticity due to fineness of formation caused by the increase of the unit powder content and the improvement of flowability, without regard to the replacement of crushed stone fines. Therefore, it can be said that the usage of crushed stone fines can control the strength of super flowing concrete by replacement and re

  • PDF

Development of 2.45GHz Microwave Identification System (2.45GHz 마이크로파 무선데이터 인식 시스템 개발)

  • 윤동기;박양하;김관호;이영철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1342-1350
    • /
    • 1999
  • In this paper, we have developed and analyzed the 2.45GHz microwave RFID system. Which is composed tag and interrogator using custom IC, and we have made the software driving the hardware for the bidirectional data transmission method. Using 3.6V power supply was used, the optimal identification range in the information transmission of the designed microwave RFID system operating at 9,600bps was l0m. In the control circuit of the tag, the low current consumption of 15$mutextrm{A}$ and the tag data transmission rate of 90% when the moving velocity was 80km/h.

  • PDF

Detecting a Relay Attack with a Background Noise (소리를 이용한 릴레이 공격 공격의 탐지)

  • Kim, Jonguk;Kang, Sukin;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.617-627
    • /
    • 2013
  • Wireless communication technology such as NFC and RFID makes the data transfer between devices much easier. Instead of the irksome typing of passwords, users are able to simply authenticate themselves with their smart cards or smartphones. Relay attack, however, threatens the security of token-based, something-you-have authentication recently. It efficiently attacks the authentication system even if the system has secure channels, and moreover it is easy to deploy. Distance bounding or localization of two devices has been proposed to detect relay attacks. We describe the disadvantages and weakness of existing methods and propose a new way to detect relay attacks by recording a background noise.

Approach to Promotion of Ubiquitous-based Cultural Service (유비쿼터스 기반의 문화서비스 추진방안)

  • Kong, Bong-Suk;Chung, Kyung-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.146-155
    • /
    • 2007
  • Since the beginning of the 21st century, the power source for the growth of our country is shifting from the 'knowledge and information'-centered business to the culture-based business attaching importance to 'creativity'. In the era of creative culture-based economy, the core resources on which the national competitive power depends can be thought to be 'cultural contents'. The current ubiquitous project, which is being promoted in our country, is characteristically placing much emphasis on building-up of the RFID-centered infrastructure so that it is poorly acknowledged by common people to whom its service is actually provided. In this study, the approach to promotion of the cultural service, to which an easy access is available as a result of combining the ubiquitous-based technology with 'cultural contents', is discussed in the 4 aspects.

Design of Small Antennas with Inductively Coupled Feed Using a Pareto Genetic Algorithm (Pareto 유전자 알고리즘을 이용한 초소형 유도결합 안테나 설계)

  • Cho Chihyun;Choo Hosung;Park Ikmo;Kim Youngkil
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.1 s.92
    • /
    • pp.40-48
    • /
    • 2005
  • In this paper, we explore the inductively coupled concept and propose a class of electrically small planar antennas. The antennas are optimized using NEC in conjunction with a Pareto GA. These antennas show good efficiency and bandwidth performance without any additional matching network. Several optimized designs are fabricated and measured. We explain the operating principle of these antennas using a simple lumped element circuit model. The proposed antennas are translated as printed lines on Duroid for RFID tag antennas.

A study on the drying characteristics of conductive ink by infrared drying system and the hot-air drying system (적외선 건조 및 열풍 건조에 대한 전도성 잉크의 건조 특성에 관한 연구)

  • Jung, Gil-Yong;Lee, Jai-Hyo;Hong, Seung-Chan
    • Proceedings of the SAREK Conference
    • /
    • 2009.06a
    • /
    • pp.183-188
    • /
    • 2009
  • RFID method is a non-contact automatic identification technology, which attaches microchips and antennas to an object in a tag form, to send and process information sent to the network using wireless frequency. Drying and curing process is extremely important which minimizes the resistivity of RFID antennas. This research is about the drying characteristic of conductivity ink, and analyzes and compares the hot-air drying process and infrared drying process. Also, the research was done for the improvement in drying performance by using combined process of hot-air and infrared mechanism. The experiment result shows that the hot-air or infrared drying system used alone cannot meet the required performance in drying printing method using conductivity ink. The combined drying system of hot-air and infrared ray showed resistance low enough in short drying and curing time, and this mechanism makes drying and curing process for mass and continuous production possible on-line.

  • PDF

A study on the drying characteristics of conductive ink by oven drying system and the hot-air drying system (Oven형 건조 및 열풍건조에 대한 전도성 잉크의 건조 특성에 관한 연구)

  • Hong, Seung-Chan;Lee, Jai-Hyo;Jung, Gil-Yong
    • Proceedings of the SAREK Conference
    • /
    • 2009.06a
    • /
    • pp.1429-1434
    • /
    • 2009
  • Recently electronic circuit pattern printing technologies like antennas of RFID process are paid attention. oven drying system is being used since drying and curing time of RFID Tag Gravure printing normally takes from 5 minutes and up to 30 minutes long. In this case the parental material which is of a sheet shape is possible, however, for a massive and a continuous production drying and curing process must be done on-line. This research compared and analyzed the an oven type drying device and a traditional hot-air drying device. Considering the experiment result, the cell depth that shows low resistivity, which doesn't consider the pattern difference, is $31{\sim}33{\mu}m$. Also, oven drying system showed some resistivity after around 120 seconds of drying time, and showed much better performance in minimum resistivity compared to the hot-air drying system.

  • PDF

A Study of Personalized User Services and Privacy in the Library (도서관의 이용자맞춤형서비스와 프라이버시)

  • Noh, Younghee
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.3
    • /
    • pp.353-384
    • /
    • 2012
  • This study was conducted on the observation that the filter bubble and privacy violation problems are related to the personalized services provided by libraries. This study discussed whether there is the possibility for invasion of privacy when libraries provide services utilizing state-of-the-art technology, such as location-based services, context aware services, RFID-based services, Cloud Services, and book recommendation services. In addition, this study discussed the following three aspects: whether or not users give up their right to privacy when they provide personal information for online services, whether or not there are discussions about users' privacy in domestic libraries, and what kind of risks the filter bubble problem can cause library users and what are possible solutions. This study represents early-stage research on library privacy in Korea, and can be used as basic data for privacy research.