• Title/Summary/Keyword: RFID Performance

Search Result 520, Processing Time 0.023 seconds

Performance Analysis of the Domestic RFID Middleware for Logistics and Distribution Store (유통 물류매장을 위한 국내 RFID 미들웨어 성능 분석)

  • Kim, Ki-Doc;Kim, Hyoung-Joon;Kim, Joeng-Hoon;Han, Sang-Bae;Kwon, Soon-Ryang
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.317-318
    • /
    • 2008
  • 효율적인 유통 물류매장 서비스를 지원하기 위해서는 RFID 미들웨어의 상태나 성능이 유동적인 환경에 대비하여 리소스의 안정적인 분배를 지원하는 환경이 필요 하다. 본 논문에서는 실제 산업 현장의 현실을 감안하여 소프트웨어 최소 요구사양으로 미들웨어 구성을 제시하는데, 필요한 정보를 제공하는데 그 목적을 두었다.

  • PDF

Performance Valuation of Fixed RFID System in UHF Spectrum (UHF대역의 고정형 RFID 시스템의 성능 평가)

  • Jung, Woo-Jae;Jeon, Ji-Young;Kim, Joeng-Hoon;Moon, Kwang-Gon;Kwon, Soon-Ryang
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.287-288
    • /
    • 2008
  • 본 논문에서는 900MHz 대역의 RFID 시스템을 생산하는 대표적인 두 제조사의 제품을 선정하여 다양한 관점에서 성능을 측정하였다. 인식률 시험과 인식범위 시험으로 구분하여 8개 항목에 걸쳐 실험을 수행한 결과 A, B사 모두 태그부착 재질이 철재 및 알루미늄일 때, 태그가 겹쳐졌을 때, 태그 CHIP이 손상되었을 때 태그 인식이 되지 않았다. 그리고 시험환경 및 조건에 따라 다양한 인식률 변화에 대한 데이터를 도출 하였다.

  • PDF

Implementation of Home Service Robot System consisting of Object Oriented Slave Robots (객체 지향적 슬레이브 로봇들로 구성된 홈서비스 로봇 시스템의 구현)

  • Ko, Chang-Gun;Ko, Dae-Gun;Kwan, Hye-Jin;Park, Jung-Il;Lee, Suk-Gyu
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.337-339
    • /
    • 2007
  • This paper proposes a new paradigm for cooperation of multi-robot system for home service. For localization of each robot. the master robot collects information of location of each robot based on communication of RFID tag on the floor and RFID reader attached on the bottom of the robot. The Master robot communicates with slave robots via wireless LAN to check the motion of robots and command to them based on the information from slave robots. The operator may send command to slave robots based on the HRI(Human-Robot Interaction) screened on masted robot using information from slave robots. The cooperation of multiple robots will enhance the performance comparing with single robot.

  • PDF

RFID-Based RTLS for Improvement of Loading Productivity in Container Terminals

  • Park, Doo-Jin;Nam, Ki-Chan
    • Journal of Navigation and Port Research
    • /
    • v.30 no.4
    • /
    • pp.285-290
    • /
    • 2006
  • Shipping companies consider most of the ship turnaround time as a critical factor when selecting a rolling port for reducing costs. So, many researchers have been studying for the optimization of preplanning and high~performance of the Gantry Cranes (GCs) in container terminals for faster loading and unloading. Therefore, in this paper, we propose an RFID (Radio Frequency Identification) based RTLS (Real-Time Location System) for reducing the ship turnaround time in ubiquitous port environment. In addition, pre-planning based on ubiquitous computing environment will support the GC and Yard Tractors (YTs), and reduce ship turnaround time more effectively. Especially, the proposed method enormously enhances the productivity of loading for the twin-lift system It will reduce the whole lead-time in the process of port logistics.

Performance Comparison of ISO / IEC 18000-3 ASK and PJM Mode (ISO/IEC 18000-3 ASK 모드와 PJM 모드의 성능 비교)

  • Kim, Jae-Lim;Yang, Hoon-Gee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.6
    • /
    • pp.70-80
    • /
    • 2008
  • This paper presents comparison of 18000-3 ASK and PJM mode RFID in terms of reading speed. This is accomplished by counting the occurrences of a few representative blocks which constitute the reader / tag interactions for each mode. To apply FS (frame slotted)-aloha protocol, four Q-algorithms, which are a Q-algorithm suggested in the standard document, a fixed Q-algorithm, a minimum Q-algorithm and the number of tag dependent Q-algorithm, are used. Through some simulations, we present the reading speed of each mode with respect to the Q-algorithm and the comparison of the reading speed between the two modes for each Q-algorithms.

  • PDF

A Design of Dual Band LNA for RFID reader Using Tunable Matching Circuit (Tunable 매칭 회로를 적용한 RFID 리더용 Dual Band LNA 설계)

  • Oh, Jae-Wook;Lim, Tae-Seo;Choi, Jin-Kyu;Kim, Hyeong-Seok
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.3-6
    • /
    • 2007
  • In this paper, a hybrid dual band LNA(Low Noise Amplifier) with a tunable matching circuit using varactor is designed for 433MHz and 912MHz RFID reader. The operating frequency is controlled by the bias voltage applied to the varactor. The measured results demonstrate that S21 parameter is 16.01dB and 10.72dB at 433MHz and 912MHz, respectively with a power consumption of 19.36mW. The S11 are -11.88dB and -3.31dB, the S22 are -11.18dB and -15.02dB at the same frequencies. The measured NF (Noise Figure) is 15.96dB and 7.21dB at 433MHz and 912MHz, respectively. The NF had poorer performance than the simulation results. The reason for this discrepancy was thought that the input matching is not performed exactly and a varactor in the input matching circuit degrades the NF characteristics.

  • PDF

DEVS-Based Simulation Model for Optimization of Sensor-Tag Operations in Cold Chain Systems (콜드체인 시스템의 센서태그 운영 최적화를 위한 DEVS 기반 시뮬레이션 모델)

  • Ryou, Okhyun;Kang, Yong-Shin;Jin, Heeju;Lee, Yong-Han
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.2
    • /
    • pp.173-184
    • /
    • 2015
  • The application of radio frequency identification (RFID) sensor-tags in cold chain systems has recently received a great deal of attention. To design cold chain systems with RFID sensor-tags that minimize the initial investment and operational cost while fulfilling the functional and operational requirements, simulation study is one of the preferable and effective approaches. To simulate the possible design configurations, the individual components in a cold chain system can be extracted and implemented as a DEVS (Discrete Event System Specification) model. Based on the proposed DEVS model, a new cold chain simulation model can be efficiently created by simply connecting each DEVS model around the RFID sensor-tag of interest in sequence according to the structure of the cold chain system, and then executed (or simulated) on Java programming environments by the DEVSJAVA simulator. As a result of simulation, some key performance indexes such as reliability, accuracy or timeliness can be calculated and used to choose better components or to compare different system configurations of cold chain systems.

MRCT: An Efficient Tag Identification Protocol in RFID Systems with Capture Effect

  • Choi, Sunwoong;Choi, Jaehyuk;Yoo, Joon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1624-1637
    • /
    • 2013
  • In RFID systems, one important issue is how to effectively address tag collision, which occurs when multiple tags reply simultaneously to a reader, so that all the tags are correctly identified. However, most existing anti-collision protocols assume isotropic collisions where a reader cannot detect any of the tags from the collided signals. In practice, this assumption turns out to be too pessimistic since the capture effect may take place, in which the reader considers the strongest signal as a successful transmission and the others as interference. In this case, the reader disregards the other collided tags, and in turn, fails to read the tag(s) with weaker signal(s). In this paper, we propose a capture effect-aware anti-collision protocol, called Multi-Round Collision Tree (MRCT) protocol, which efficiently identifies the tags in real RFID environments. MRCT deals with the capture effect as well as channel error by employing a multi-round based identification algorithm. We also analyze the performance of MRCT in terms of the number of slots required for identifying all tags. The simulation results show that MRCT significantly outperforms the existing protocol especially in a practical environment where the capture effect occurs.

A Study on Applicability of RFID System for C-Hook Identification (C-Hook 인식을 위한 RFID 시스템의 적용 가능성에 대한 연구)

  • Lee, Chang-Woo;Cho, Hyeon-Woo;Ban, Sung-Jun;Kwon, Yong-Sin;Kim, Sang-Woo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.1
    • /
    • pp.81-87
    • /
    • 2008
  • C-Hook is a kind of conveyer system for transporting steel coil in POSCO. To detect the current position and the trajectory of steel coils in a plant, C-Hooks are tracked by an inspection system based on PLC. The inspection system detects transit of C-Hooks by monitoring a physical contact between steel bars on a C-Hook and the inspection sensors. However, this system is not reliable because of the abrasion, damage and aging. Moreover, the number of distinguishable C-Hooks is limited by the number of combination of steel bars on a C-Hook. It means that more steel bars should be installed for distinguishing the more C-Hooks. Therefore, the conventional system is difficult and expensive to maintain. To overcome these problems, we propose a C-Hook identification system that uses RFID which is a non-contact type identification system, and evaluate its performance and applicability from a new monitoring program that operates along with the conventional system in the real environment of POSCO.

Implementation of RFID Reader System using the Data Encryption Standard Algorithm (표준 암호화 알고리즘을 이용한 RFID 판독 시스템의 구현)

  • 박성욱
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.55-61
    • /
    • 2003
  • The Data Encryption Standard(DES) has been a worldwide standard for over 20 years. DES is one of the block encryption techniques which ciphers 64-bit input data blocks using a 56-bit private key. The DES algorithm transforms 64-bit input in a series of steps into a 64-bit output. Thus, it is impossible to deduce the plaintext from the ciphertext which encrypted by this algorithm without the key. This paper presents an implementation of RFID roader system using the DES algorithm. An implemented system enhances the credibility of the encryption algorithm by using the Cipher Block Chining(CBC). Experimental results also show that the implemented system has better performance over the conventional commercial product.

  • PDF