• Title/Summary/Keyword: RFID Features

Search Result 52, Processing Time 0.028 seconds

Precision Film Control of Roll to Roll System for RFID Printing (인쇄전자를 위한 롤투롤 시스템의 필름 정밀제어에 관한 연구)

  • Kim, Dong-Min;Choi, Jong-Guen;Kim, Hyung-Sun
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.19 no.6
    • /
    • pp.867-874
    • /
    • 2010
  • RFID printing technology has emerged recently as an important tool for leading future IT. Therefore, many manufacturers concerning on low cost and mass production of the related products pay close attention to the printing technology. In order to realize printed electronics, the technologies for fine line-width/gap printing and registration are essential work. This study proposes a precise Roll to Roll control system that is capable of tilting two posts. Two controllable tilting posts can adjust film position at traverse direction for the precision registration. A mathematical model for representing the geometric features of each posts in Roll to Roll printing system is established first. Then an operating program is built to implement the system and to control film movement. For experimental test, a hard ware system is fabricated which is consisted of two AC servo motors, two posts tilting mechanisms, several guide rolls, and so on. The test results show the proposed system can control the film position precisely at transverse direction.

Using Arduino and RFID shield program development (아두이노와 RFID 실드를 사용한 프로그램 개발)

  • Lee, Kyung-mu;Lee, Sung-jin;Choi, Chul-kil;Kim, Jin-il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.961-964
    • /
    • 2013
  • Arduino is for design based on open source prototyping platform, artist, designer, hobby activists, etc, i has been designed for all those who are interested in the environment construct. Arduino adventage you can easily create applications hardware, without deep knowledge about the hardware. Configuration of arduino using AVR microcontroller ATmage 168, software to action arduino using arduino program, MATLAB, Processing. Arduino is open source base, you can hardware production directly and using shield additionally, the arduino can be combined. Android is open source. Continue to expand through a combination of hardware, Arduino. It name is shield. Be given to the Arduino Uno board to the main board, the shield extends to the various aspects and help can be equipped with more features. The shield on top of the shield can be combined as a kind of shield and Ethernet shield, motor shield, the shield RFID hardware beyond a simple extension can be configured. In this paper, sortware was used for arduino program, hardware was used for arduino Uno board, the additional shield using RFID shield. Configure the hardware to be compatible with this tag combined the 13.56MHz tag SM130.

  • PDF

Development of a synthetic library automation system

  • Lee, Jeong-Hun;Kim, Young-Lyul;Lim, Sung-Jin;Ki, Hwan-Eom;Lee, Jong-Ik;Kim, Jong-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1710-1713
    • /
    • 2003
  • We developed the synthetic library automation system. Developed system is comprised of two main units: an auto sorting system of books and a wireless management system. An auto sorting system is composed of a book return machine, a robot system, and an emergency bookshelf. A book return machine is operated by magnetic removal-revival. A wireless management system is development of RFID, or radio frequency identification, and is composed of a RF module and uninhabited return machine and a loss prevention system. The software for the synthetic library automation system is divided into three groups. We realized the developed automation system, and then get the features.

  • PDF

A Study on the Implementation of RFID-Based Autonomous Navigation System for Robotic Cellular Phone (RCP) (RFID를 이용한 RCP 자율 네비게이션 시스템 구현을 위한 연구)

  • Choe Jae-Il;Choi Jung-Wook;Oh Dong-Ik;Kim Seung-Woo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.5
    • /
    • pp.480-488
    • /
    • 2006
  • Industrial and economical importance of CP(Cellular Phone) is growing rapidly. Combined with IT technology, CP is one of the most attractive technologies of today. However, unless we find a new breakthrough in the technology, its growth may slow down soon. RT(Robot Technology) is considered one of the most promising next generation technologies. Unlike the industrial robot of the past, today's robots require advanced features, such as soft computing, human-friendly interface, interaction technique, speech recognition object recognition, among many others. In this paper, we present a new technological concept named RCP (Robotic Cellular Phone) which integrates RT and CP in the vision of opening a combined advancement of CP, IT, and RT, RCP consists of 3 sub-modules. They are $RCP^{Mobility}$(RCP Mobility System), $RCP^{Interaction}$, and $RCP^{Integration}$. The main focus of this paper is on $RCP^{Mobility}$ which combines an autonomous navigation system of the RT mobility with CP. Through $RCP^{Mobility}$, we are able to provide CP with robotic functions such as auto-charging and real-world robotic entertainment. Ultimately, CP may become a robotic pet to the human beings. $RCP^{Mobility}$ consists of various controllers. Two of the main controllers are trajectory controller and self-localization controller. While the former is responsible for the wheel-based navigation of RCP, the latter provides localization information of the moving RCP With the coordinates acquired from RFID-based self-localization controller, trajectory controller refines RCP's movement to achieve better navigation. In this paper, a prototype of $RCP^{Mobility}$ is presented. We describe overall structure of the system and provide experimental results on the RCP navigation.

The Study of Sensor Network for Information Retrieval and Communication Protocol High Performance Algorithm (센서 네트워크의 정보검색 및 통신프로토콜 성능향상 알고리즘에 관한 연구)

  • Kang, Jeong-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.816-823
    • /
    • 2010
  • Recently research efforts for ubiquitous technology that includes RFID(Radio Frequency Deification and sensor networks are conducted very actively The architectural framework of the USN sensor network discovery service. The survey of the USN technology is conducted on four technological visions that contain USN system technology USN networking technology and USN middleware along with the service platform, With respect to each technological division domestic and worldwide leading research projects are primarily explored with their technical features and research projects are primarily explored with their technical features and research outputs. Boasted on the result of the survey we establish a USN software model that includes data sensing, sensor data storage sensor data storage sensor data naming and sensor feed name service. This main objective of this model is to provide a reference model for the facilitation of USN application developments.

A Study on the Design of Automatic Billing Information Systems for Long-Term Home Care Services Business Using iBeacon (iBeacon을 활용하는 장기요양 재가 서비스 업무를 위한 자동청구 정보시스템의 설계에 관한 연구)

  • Jung, Sung Hwa;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.3
    • /
    • pp.612-619
    • /
    • 2016
  • Applying evolved IT technology to increase the satisfaction of the consumer is a typical feature of the rapidly transformed service industry. Smart devices have taken a place as the mainstream of major media, moreover, IT service strategies utilizing smart devices have been constantly developed. Location recognition method of users has been proposed as one of the significant features to the IT service industry. The long-term care home services can be one example of user location recognition methods that real time computerization of service record utilize an attached tag to home of pensioners with RFID reader or an NFC function of mobile when a home carer provides service. And, the Homecare Electronics Management System (HEMS) and the various location recognition methods will be discussed to improve effectiveness of services. In this paper, we propose a home applicable electronic management system which insurer, home care service facilities, home cares, pensioners and guardians which enables to simultaneously check service records based on the improved system by use of iBeacon.

A Study on the Ubiquitous Cave Systems (유비쿼터스 동굴시스템에 관한 연구)

  • Oh, Jong-Woo
    • Journal of the Speleological Society of Korea
    • /
    • no.90
    • /
    • pp.35-56
    • /
    • 2009
  • The purpose of this paper is to analyze the implementation of the karst infrastructure systems for the u-cave. IT based u-cave represents spatial information derived fields, such as geographical distribution of the cave boundaries, physical configuration of the cave locations and formation characteristics of the karst history. These three aspects relate to karst infrastructure systems, cave monitoring center and spatial database implementation. In terms of the IT based u-cave infrastructure implementation systems, the u-cave depends on IT contents and spatial features. uIT contents are strongly related to IT839 strategy due to the national agenda is "u-Korea". Cave should contribute to u-cave construction through the spatial analyses methods including USN, RFID, LiDAR, ELD, and GIS technologies. For these methods various cave functions will guide to u-cave's distribution, location, and characteristics of karst. The infrastructure consists of landforms and speleothem facilities, underground related facilities, environmental protection systems, and cave planning. These six units of the cave infrastructures have spatial databases that consist of spatial configuration, such as 4-D in order to draw the spatial distribution of the limestone and lava caves. IT based u-cave system infrastructure implementation should deal with IT convergence to generate fusion affects.

A Study on Secure and Efficient Wireless Network Management Scheme based Multi users for Ubiquitous Environment (유비쿼터스 환경을 위한 다중 사용자 기반의 안전하고 효율적인 무선 네트워크 관리 기법 제안)

  • Seo Dae-Hee;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.1-10
    • /
    • 2006
  • Ubiquitous computing, a new type of network environment has been generating much interest recently and has been actively studied. In ubiquitous computing, the sensor network which consists of low electric power ad-hoc network-based sensors and sensor nodes, is particularly the most important factor The sensor network serves as the mediator between ubiquitous computing and the actual environment. Related studies are focused on network . management through lightweight hardware using RFID. However, to apply these to actual environment, more practical scenarios as well as more secured studies equipped with secures and efficiency features are needed. Therefore, this study aims to build a wireless network based on PTD for multi users, which provides the largest utility in individual networks, and propose an appropriate management method. The proposed method is designed to enhance security and efficiency related to various services required in wireless networks, based on the reliable peripheral devices for users or pm. using pm, which has been applied to electronic commerce transactions in existing papers, this study also proposed an appropriate management method that is suitable for a dynamic environment and setting a temporary group to provide various services.

A Qualitative Study on the Period-Specific Changes of Job Factors and Performance Features in Academic Libraries (질적 분석을 통한 대학도서관 업무의 시대별 수행 형태 및 요소 변화에 관한 연구)

  • Cho, Chul-Hyun;Noh, Dong-Jo
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.4
    • /
    • pp.137-165
    • /
    • 2015
  • This study aimed to investigate the period-specific changes (Library 1.0, Library 2.0, Library 3.0 Period) of job factors and performance features in academic libraries. For this, the study categorized an academic library's job into five dimensions: 1) library administration 2) collection development and management 3) information organization 4) information services and 5) information system development and management, After the categorized library's job was defined in detail, the Delphi survey was conducted twice on librarians and professors of library and information science. The result showed that there were many changes in job factors and performance features in academic libraries towards the period of library 2.0 characterized by user participation, sharing and openness and into library 3.0 characterized by social network and semantic web. Library 3.0 is likely to bring about a significant change in user services with ever changing technological advances stemming from library 2.0, such as mobile services, RFID and NFC etc. The finding of the study suggest that library systems need to be continually upgraded in the period of library 3.0.

Optimal MIFARE Classic Attack Flow on Actual Environment (실제 환경에 최적화된 MIFARE Classic 공격 절차)

  • Ahn, Hyunjin;Lee, Yerim;Lee, Su-Jin;Han, Dong-Guk
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2240-2250
    • /
    • 2016
  • MIFARE Classic is the most popular contactless smart card, which is primarily used in the management of access control and public transport payment systems. It has several security features such as the proprietary stream cipher Crypto 1, a challenge-response mutual authentication protocol, and a random number generator. Unfortunately, multiple studies have reported structural flaws in its security features. Furthermore, various attack methods that target genuine MIFARE Classic cards or readers have been proposed to crack the card. From a practical perspective, these attacks can be partitioned according to the attacker's ability. However, this measure is insufficient to determine the optimal attack flow due to the refined random number generator. Most card-only attack methods assume a predicted or fixed random number, whereas several commercial cards use unpredictable and unfixable random numbers. In this paper, we propose optimal MIFARE Classic attack procedures with regards to the type of random number generator, as well as an adversary's ability. In addition, we show actual attack results from our portable experimental setup, which is comprised of a commercially developed attack device, a smartphone, and our own application retrieving secret data and sector key.