• Title/Summary/Keyword: RFID 성과

Search Result 1,053, Processing Time 0.036 seconds

Personalize the Brick'n Mortar

  • Kim, Chan-Young;Melski, Adam;Caus, Thorsten;Christmann, Stefan;Thoroe, Lars;Schumann, Matthias
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.1088-1095
    • /
    • 2008
  • The outpaced growth of online channel sales over the traditional retail sales is a result from superior shopping convenience that online stores offer to their customers. One major source of online shopping convenience is a personalized store that reduces customer's shopping time. personalization of an online store is accomplished by using various in-store shopping behavior data that the Internet and Web Technology provides. Brick-and-mortar retailers have not been able to make this type of data available for their stores until now. However, RFID technology has now opened a new possibility to personalization of traditional retail stores. In this paper, we propose BRIMPS (BRIck-and-Mortar Personalization System) as a system that brick-and-mortar retailers may use to personalize their business and become more competitive against online retailers.

  • PDF

Security Analysis of Light-weight Block Cipher mCrypton Suitable for Ubiquitous Computing Environment (유비쿼터스 환경에 적합한 경량 블록암호 mCrypton에 대한 안전성 분석)

  • Lee, Chang-Hoon;Lee, Yu-Seop;Sung, Jae-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.5
    • /
    • pp.644-652
    • /
    • 2009
  • New communication environments such as USN, WiBro and RFID have been realized nowadays. Thus, in order to ensure security and privacy protection, various light-weight block ciphers, e.g., mCrypton, HIGHT, SEA and PRESENT, have been proposed. The block cipher mCrypton, which is a light-weight version of Crypton, is a 64-bit block cipher with three key size options (64 bits, 96 bits, 128 bits). In this paper we show that 8-round mCrypton with 128-bit key is vulnerable to related-key rectangle attack. It is the first known cryptanalytic result on mCrypton. We first describe how to construct two related-key truncated differentials on which 7-round related-key rectangle distinguisher is based and then exploit it to attack 8-round mCrypton. This attack requires $2^{45.5}$dada and $2^{45.5}$time complexities which is faster than exhaustive key search.

  • PDF

A Photo Viewing Interface in a Ubiquitous Display Environment (유비쿼터스 디스플레이 환경에서의 사진 감상 인터페이스)

  • Ryu, Han-Sol;Choi, Soo-Mi
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.10
    • /
    • pp.1363-1373
    • /
    • 2009
  • In a ubiquitous computing environment, people more and more become to use multiple displays. When using such ubiquitous displays, it is needed for users to seamlessly interact with the displays for a certain content. In this paper, we propose a seamless interface that allows users to see photos across multiple displays. Many photos can be displayed on a screen at the same time because they are shown in 3D space. And a group of photos is represented using a cube metaphor. A user can manipulate photos directly using a touch screen and also see the photos continuously using PDAs when the user moves to other places. In addition, the user can interact with the photos seamlessly using another display. The developed system was designed to interact according to user's movements and not to draw user's attention too much as a kind of ambient display. Using RFID and ultrasonic sensors it recognizes a user and the user's proximity to the display, and then automatically determines the screen image and the user interface accordingly.

  • PDF

The Study of Sensor Network for Information Retrieval and Communication Protocol High Performance Algorithm (센서 네트워크의 정보검색 및 통신프로토콜 성능향상 알고리즘에 관한 연구)

  • Kang, Jeong-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.816-823
    • /
    • 2010
  • Recently research efforts for ubiquitous technology that includes RFID(Radio Frequency Deification and sensor networks are conducted very actively The architectural framework of the USN sensor network discovery service. The survey of the USN technology is conducted on four technological visions that contain USN system technology USN networking technology and USN middleware along with the service platform, With respect to each technological division domestic and worldwide leading research projects are primarily explored with their technical features and research projects are primarily explored with their technical features and research outputs. Boasted on the result of the survey we establish a USN software model that includes data sensing, sensor data storage sensor data storage sensor data naming and sensor feed name service. This main objective of this model is to provide a reference model for the facilitation of USN application developments.

A Data Mining Tool for Massive Trajectory Data (대규모 궤적 데이타를 위한 데이타 마이닝 툴)

  • Lee, Jae-Gil
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.3
    • /
    • pp.145-153
    • /
    • 2009
  • Trajectory data are ubiquitous in the real world. Recent progress on satellite, sensor, RFID, video, and wireless technologies has made it possible to systematically track object movements and collect huge amounts of trajectory data. Accordingly, there is an ever-increasing interest in performing data analysis over trajectory data. In this paper, we develop a data mining tool for massive trajectory data. This mining tool supports three operations, clustering, classification, and outlier detection, which are the most widely used ones. Trajectory clustering discovers common movement patterns, trajectory classification predicts the class labels of moving objects based on their trajectories, and trajectory outlier detection finds trajectories that are grossly different from or inconsistent with the remaining set of trajectories. The primary advantage of the mining tool is to take advantage of the information of partial trajectories in the process of data mining. The effectiveness of the mining tool is shown using various real trajectory data sets. We believe that we have provided practical software for trajectory data mining which can be used in many real applications.

Study on water pollution measurement and integration monitoring system with B-TOX (B-TOX를 이용한 오염수 측정 및 통합관리시스템 구현에 관한 연구)

  • Yang, Jae-Soo;Han, Yong-Hwan;Lee, Young-Ha;Kim, Yoon-Hyun;Kim, Jing-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.61-67
    • /
    • 2010
  • In operating estimation system, the river and lake is almost simple monitoring system or independent monitoring system. But the present system has many weak points about the concurrent analysis ability of various information collection. Sensors generating the information is not accurate. Therefore, we have something that can be improved. Although we have the related facilities of the purification plant, forebays and sewage disposal plant, and suffer from the difficulty about lack of system of estimation, management and control. As a result of this paper, monitoring system can observe the water pollution and various water environment of whole country. Also, through the sensors of USN, Zigbee, RFID and middle ware, which can service and construct service platform, we present standard plan of remarkable scalability service platform.

On the Design of High Order Transformer Circuit Using the Genetic Algorithm and Its Application to the Wheeler Cap Measurement (유전자 알고리즘을 사용한 안테나 고차 변압 회로 구성과 변압 회로를 사용한 Wheeler Cap 효율 측정법)

  • Cho Chi-Hyun;Choo Ho-Sung;Park Ik-Mo;Kang Jin-Seob
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.8 s.111
    • /
    • pp.753-759
    • /
    • 2006
  • Generally, the Wheeler cap method is used to measure the efficiency of small antennas. This method often gives an unreliable efficiency when the antenna has a complicated operating principle. However, if the high-order circuit model which more closely represents the input impedance of the antenna is used in Wheeler cap method, then more accurate efficiency can be achieved. In this paper, we propose a novel method that can build the high-order circuit model using transformer circuits with the genetic algorithm(GA). To efficiently reduce the searching space in the GA and improve the convergence of the GA process, we suggest a novel scheme that finds appropriate initial values. Finally we verify the proposed method by measuring the efficiency of some passive RFID tag antennas.

Design of Edge Manager for Filtering Sensor Tag Data (센서 태그 데이터의 필터링을 위한 Edge Manager의 설계)

  • Lee, Jun-Ho;Ryu, Woo-Seok;Hong, Bong-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06c
    • /
    • pp.138-143
    • /
    • 2008
  • RFID 기술은 기존의 바코드 기술보다 발전된 무선의 비접촉 인식 기술로서, 유비쿼터스 컴퓨팅의 핵심기술로 간주되고 있다. RFID 태그는 기존의 단순한 사물의 인식 기능 중심에서 사물의 상태 및 환경 정보를 감지할 수 있는 센서 태그로의 발전으로 물류 프로세스의 양적, 질적 향상을 도모할 수 있게 되었다. 센서 태그는 환경 정보를 센싱하기 위하여 배터리를 내장하고 있으며, RF Transceiver의 내장 유무에 따라 자체적으로 신호를 보낼 수 있는 active 센서 태그와 리더로부터의 신호를 사용하는 semi-passive 센서 태그로 구분된다. Semi-passive 센서 태그는 배터리를 부착함으로써 passive 태그에 비해 인식률과 인식거리가 향상되었고 active 태그에 비해 단가가 매우 저렴하여 센서 태그가 부착된 물품의 상태를 모니터링하고 환경을 감시하는 다양한 응용에 사용될 수 있다. 이러한 응용의 요구에 따라 Edge Manager는 기존의 passive 태그는 물론 센서 태그를 지원함으로써 상위 응용에게 정제된 결과를 전달할 필요성이 있다. 본 논문에서는 특히 semi-passive 센서 태그를 지원하는 Edge Manager의 설계를 위하여, 센서를 사용한 또 다른 활용 분야인 센서 네트워크에서의 질의 유형을 분석하고, semi-passive 센서 태그의 특징을 고려한 요구사항을 분석한다. Semi-passive 센서 태그는 센서 네트워크의 센서 노드와는 달리 태그 레벨에서 필터링과 병합을 수행할 수 없으므로 Edge Manager에서 이러한 기능이 제공되어야 한다. 본 논문에서는 Edge Manager에서의 센서 태그 데이터에 대한 질의를 위한 방법으로 EPCglobal ALE 표준명세의 ECSpec을 확장하는 방법을 제안하고, 센서 태그 데이터의 특성을 고려한 필터링 기법과 병합(aggregation) 기법을 적용한 질의 처리가 가능한 Edge Manager의 구조를 제시한다.

  • PDF

A Calculus of Real-Time Distribution, Mobility and Interaction for Tracing Mobile Agents with Transporting Objects (객체전송 이동체의 추적을 위한 실시간 분산, 이동, 상호작용)

  • Choi, Jung-Rhan;Lee, Moon-Kun
    • Journal of Internet Computing and Services
    • /
    • v.8 no.2
    • /
    • pp.1-13
    • /
    • 2007
  • GPS/GIS and RFID technologies have been changing the paradigm af our society toward ubiquitous era. Especially, geographically distributed mobile agents with transporting objects need to be automatically recognizable and traceable under certain conditions. To do this, fundamental theories and technologies are required to specify and verify spatial and temporal behaviors of agents on geographical space. This paper presents a new formal method, called Calculus of Real-Time Distribution, Mobility, and Interaction (CaRDMI), for this purpose. For specification, CaRDMI defines a map, mobile agents with transporting objects. The movement of on agent is represented by a path on the map, consisting of a list of nodes and a list of edges with spatial and temporal constraints. Interactive constraints among agents are represented by synchronization modes on objects at nodes. These constraints are distinguishable features of CaRDMI from other methods. Especially, many-to-many timed synchronization constraints are noticeable. For verification, CaRDMI presents the spatial, temporal and interactive deduction rules and the spatial and temporal equivalence relations.

  • PDF

Design of Security Agent System to Provide Ubiquitous Service (유비쿼터스 서비스를 위한 보안 에이전트 시스템 설계)

  • Kim, Seok-Soo;Park, Gil-Cheol;Song, Jae-Gu
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.101-106
    • /
    • 2007
  • Recently, Ubiquitous innovation is being promoted so that they can support the uHealthcare provide management to human's health. It is thus necessary to conduct such research on the medical care environment where there is a high demand for utilization of status information. In the current situation, there is a lack of research on measures of security processing and monitoring patient status information produced from rapid growth of infra within Medical environment. This study suggests a solution of using RFID to gather patient information such as inpatient information, location of treatment room, progress of patient, humidity, temperature, and diagnostic status, after which the information are protect and processed using security level method.

  • PDF