• Title/Summary/Keyword: RFID 성과

Search Result 1,053, Processing Time 0.03 seconds

Design of Sensor Middleware Architecture on Multi Level Spatial DBMS with Snapshot (스냅샷을 가지는 다중 레벨 공간 DBMS를 기반으로 하는 센서 미들웨어 구조 설계)

  • Oh, Eun-Seog;Kim, Ho-Seok;Kim, Jae-Hong;Bae, Hae-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.8 no.1 s.16
    • /
    • pp.1-16
    • /
    • 2006
  • Recently, human based computing environment for supporting users to concentrate only user task without sensing other changes from users is being progressively researched and developed. But middleware deletes steream data processed for reducing process load of massive information from RFID sensor in this computing. So, this kind of middleware have problems when user demands probability or statistics needed for data warehousing or data mining and when user demands very important stream data repeatedly but already discarded in the middleware every former time. In this paper, we designs Sensor Middleware Architecture on Multi Level Spatial DBMS with Snapshot and manage repeatedly required stream datas to solve reusing problems of historical stream data in current middleware. This system uses disk databse that manages historical stream datas filtered in middleware for requiring services using historical stream information as data mining or data warehousing from user, and uses memory database that mamages highly reuseable data as a snapshot when stream data storaged in disk database has high reuse frequency from user. For the more, this system processes memory database management policy in a cycle to maintain high reusement and rapid service for users. Our paper system solves problems of repeated requirement of stream datas, or a policy decision service using historical stream data of current middleware. Also offers variant and rapid data services maintaining high data reusement of main memory snapshot datas.

  • PDF

Knowledge as Marketing Message : Design and Analysis of Human-Reader Based Personal Experience Management Business Model (마케팅 메시지로서의 지식 : Human-Reader 기반의 개인 경험 관리 비즈니스 모델 설계 및 분석)

  • Jun, Jung-Ho;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.1
    • /
    • pp.17-43
    • /
    • 2010
  • This research considers the role of knowledge as marketing message, designs and analyses the personal experience management (PEM) business model using Human-Reader system. It is difficult to save and manage person's daily experience and relevant contents due to the lack of proper infrastructure and system. On the contrary, using Human-Reader infrastructure, person's experience and various relevant contents can be easily saved and managed because seamlessness between offline and online and the various devices that person can always carry along in ubiquitous environment. Since person can store and manage information, contents and advertisements through Human-Reader system and u-PEMS, marketing messages and advertisements do not have to be repetitive and stimulating. Instead, marketing messages and advertisements in Human-Reader environment should be granting values that can be saved and managed. We propose various scenarios, processes and its issues. And we analyze the expected value of RFID tag used on the proposed business model by so-called 'Tag Evaluation Model' and assess the assumptions that are basis of the proposed business model for evaluate the feasibility of the u-PEM business model.

Efficient Roadside Trees Management using RFID and GIS Technology (무선인식과 지형공간정보체계를 이용한 효율적인 가로수관리)

  • Kim, Eui-Myoung;Lee, Yun;Kim, Sung-Soo;Kim, In-Hyun;Choi, Young-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.1
    • /
    • pp.137-148
    • /
    • 2006
  • Roadside trees that are managed by the local government play important roles to enhance the city lifestyle in many ways. However, because of insufficient human resources that monitor fields and regulations, most roadside trees were left unprotected and lacked the professional management. Also, due to the lack of financial support, pesticides or treatments have rarely been done in a proper time. To solve this existing matter, we have proposed concrete methods that include a latest communication technology, and developed an on-site management system and a web-monitoring system for roadside trees. Our successful research includes efficient approaches to identify an individual tree and integration of both field works and internal work processes with wireless communications and web displays to monitor the roadside trees.

  • PDF

Classification and Standardization of Master-Data of Supply Chain for Adopting Common Standard Platform (공통표준플랫폼 적용을 위한 공급사슬 기준정보 분류 및 표준화)

  • Chang, Tai-Woo;Yoon, So-Yeon;Lim, Hye-Sun
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.1
    • /
    • pp.151-171
    • /
    • 2012
  • In applying RFID/USN technology to various industries, it is needed to solve the problem caused by the system differences. Accordingly, this study introduces the common standard platform concept, and suggests the standard data scheme which provides the uniform perspective of classifying supply chain data and of using vocabularies. We selected several industry areas applicable for the platform, which are pharmaceutical, cosmetics, food and liquor industry. We collect and organize terminologies used in the supply chain of each industry, and then classify them according to the defined data attributes. The standardized vocabularies are suggested based on the contextured scheme of data classification. This study could provide more convenient way of communication between business partners, system developers and users of the platform.

An Intra-Wireless Vessel Communications Using Analysis of Interference Probability between Radio Devices (무선기기간 간섭확률분석의 Intra-Wireless 선박 통신 적용)

  • Kim, Seong-Kweon;Kim, Dong Ho;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.4
    • /
    • pp.402-407
    • /
    • 2013
  • In this paper, we consider an interference scenario and interference simulation method of intra-wireless vessel communications using SEAMCAT (Spectrum Engineering Advanced Monte-Carlo Analysis) simulator. The interference between electromagnetic equipment and low power radio apparatus can deteriorate a stability of vessel system and it is necessary to analyze the interference probability between radio devices. The proposed simulation method in the 13.56MHz ISM frequency band shows that the interference effect can be minimized when the distance between the devices is greater than 4.7m and 2.7m in case that the victim receiver (VR) are RFID and remote control(RC) toy, respectively. The proposed interference scenario and simulation method are expected to be helpful in the interference probability analysis and regulation policy in the ISM frequency band.

Design of Vehicle Security Authentication System Using Bluetooth 4.0 Technology (블루투스 4.0 기술을 이용한 차량용 보안인증 시스템 설계)

  • Yu, Hwan-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.325-330
    • /
    • 2017
  • Bluetooth 4.0 is a technology suitable for the Internet of things that is used for communication between various devices. This technology is suitable for developing a service by combining with automobiles. In this study, a security authentication system was designed by linking Bluetooth 4.0 technology and a vehicle system as an implementation example of an object internet service. A procedure was designed for security authentication and an authentication method is proposed using a data server. When the security authentication function is provided, various additional services can be developed using the information collection function of the risk notification and user action history. In addition, BLE (Bluetooth Low Energy) technology, which is a wireless communication technology that enables low-power communication and low-power communication in the process of the standardization and development of Bluetooth technology and technology, improves the battery life through the use of RFID or NFC This study expanded the range possible. The security service can be extended by expanding the scope of authentication by the contactless type. Using the proposed system, a customized service can be provided while overcoming the problems of an existing radio frequency (RF)-based system, portability, and battery usage problem.

Design of Ubiquitous Payment Process for Enhancing Seamlessness and Privacy (연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계)

  • Lee, Kyoung Jun;Jeong, Mu Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.3
    • /
    • pp.1-13
    • /
    • 2006
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. Payment, however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, strong personal device, and peer-based information transactions. We also propose U-SDT Protocol integrating technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF

A Study on Safe Authentication Method for Security Communication in RFID Environment (RFID 환경에서 보안 통신을 위한 안전한 인증 방안에 관한 연구)

  • Ko, Hoon;Kim, Bae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user's position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment.

  • PDF

Processing of Sensor Data Stream for OSGi Frameworks (OSGi를 위한 실시간 센서 데이터스트림 처리 방법)

  • Cha, Ji-Yun;Byun, Yung-Cheol;Lee, Dong-Cheal
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.1014-1021
    • /
    • 2009
  • In an environment of home network where a number of technologies including heterogeneous hardware platforms, networking and protocols, middleware systems, and etc, exist, OSGi provides a platform for deployment and sharing of services managed in hardware and guarantees compatibility among applications. However, only simple control and processing of event data are considered in a home network using OSGi, and the consideration about real time processing of data stream generated by sensors is not enough. Therefore, researches allowing users to effectively develop OSGi applications by using various kinds of sensors generating data streams in the home network environment using OSGi are needed. In this paper, we propose an effective method of processing various types of real time data streams supplied to OSGi applications, including filtering, grouping, and counting, etc.

Sensor Module Architecture and Data Processing Framework for Energy Efficient Seamless Signal Processing in WSN (무선 센서네트워크에서의 저전력 연속 신호처리를 위한 센서모듈 아키텍처 및 데이터처리 프레임워크)

  • Hong, Sang-Gi;Kim, Nae-Soo;Kim, Whan-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.9-16
    • /
    • 2011
  • Due to the development and proliferation of ubiquitous technologies and services, various sensor network applications are being appeared on the stage. The needs for algorithms requiring sensor data fusion and complex signal processing with a high-performance processor such as a digital signal processor are also increased. However, it is difficult to use such processor for the low-power sensor network operating with a battery because of power consumption. This paper proposes a hybrid-type sensor module architecture supporting wakeup/sleep software framework for the wireless sensor node and shows the implemented sensor node platform and performances focused on the energy consumption and wakeup time.