• Title/Summary/Keyword: RFID Reader System

Search Result 478, Processing Time 0.024 seconds

Implementation of Real-time Power Facility Monitoring System Using WSN (무선 센서 네트워크 기술을 이용한 전력 설비 실시간 감시 시스템 구현)

  • Kim, Young-Il;Cho, Seon-Ku;Yi, Bong-Jae;Song, Jae-Ju;Shin, Jin-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.488-490
    • /
    • 2006
  • In the electric power industry, It is important that the supply of energy must always be guaranteed. To satisfy these requirements, various forms of technologies are needed, such as RFID tag, reader, sensor network, middleware and so on. WSN (Wireless Sensor Network) technologies of the electric power industry are in the early stage and there is no clear guideline for developing electric facility management system using WSN. Relevant experience is limited, the challenge will be to derive requirement from business practice and to determine whether it is possible or not. To explore this issue, we focus on researching and field test of prototype system in Korea Electric Power Corporation (KEPCO). In this paper we describe requirement from power industry. And we introduce design and implementation of the power facility monitoring system.

  • PDF

Performance Analysis of Wireless Communications between Tag and Reader in EPCglobal Gen-2 RFID System (EPCglobal Gen-2 RFID 시스템 태그와 리더간의 무선 전송 방식 성능 분석)

  • Yoon, Hee-Seok;Mohaisen, Manar;Chang, Kyung-Hi;Bae, Ji-Hoon;Choi, Gil-Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.9
    • /
    • pp.1047-1056
    • /
    • 2007
  • In this paper, we analyze the performance of the encoding and the modulation processes in the downlink and uplink of the EPCglobal Gen-2 system through the analysis and simulation. Furthermore, the synchronization issues on time and frequency domain and the preamble architecture are evaluated. By incorporating the encoding and the modulation technigue in the downlink and uplink, we assess the performance of the EPCglobal Gen-2 system. We also introduce the encoding and backscatter modulation process as well as the BER performance of FM0 code. In addition, the importance and the role of the frequency and time synchronization, such as the preamble and frame synchronization are explained. Through the simulation in the uplink on the detection probability through preamble, we find that the detection probability approaches 1 for 13 dB $E_b/N_0$.

A Study on Self-Localization of Home Wellness Robot Using Collaboration of Trilateration and Triangulation (삼변·삼각 측량 협업을 이용한 홈 웰니스 로봇의 자기위치인식에 관한 연구)

  • Lee, Byoungsu;Kim, Seungwoo
    • Journal of IKEEE
    • /
    • v.18 no.1
    • /
    • pp.57-63
    • /
    • 2014
  • This paper is to technically implement the sensing platform for Home-Wellness Robot. The self-Localization of indoor mobile robot is very important for the sophisticated trajectory control. In this paper, the robot's self-localization algorithm is designed by RF sensor network and fuzzy inference. The robot realizes its self-localization, using RFID sensors, through the collaboration algorithm which uses fuzzy inference for combining the strengths of triangulation and triangulation. For the triangulation self-Localization, RSSI is implemented. TOA method is used for realizing the triangulation self-localization. The final improved position is, through fuzzy inference, made by the fusion algorithm of the resultant coordinates from trilateration and triangulation in real time. In this paper, good performance of the proposed self-localization algorithm is confirmed through the results of a variety of experiments in the base of RFID sensor network and reader system.

A Study of UHF RFID Metallic Tag Design for Long Reading Range Using a Cavity Structure (캐비티 구조를 사용한 장거리 인식용 UHF RFID 금속용 태그 설계에 관한 연구)

  • Lee, Jin-Seong;Lee, Kyoung-Hwan;Yeo, Jun-Ho;Chung, You-Chung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1468-1474
    • /
    • 2009
  • This paper shows an UHF RFID metallic tags using a Cavity structure for a long reading range. The reading range of a general passive tag is limited because the EIRP of a reader system is limited as 36㏈m by ISO 18000-6. To extend the reading range, the tag antenna should have a high gain antenna structure. The designed tag antenna is recognized over 10m range with a Cavity structure. The directivity pattern and the performance of the tag with the Cavity structure is stable when it is attached to a metallic object. The designed tag antenna has two kinds as cavity thickness. The sizes of designed tag antennas are $176\;{\times}\;52\;{\times}\;10\;mm$ and $176\;{\times}\;61\;{\times}\;30mm$ They can be attached to a large metallic materials and heavy equipments. The measured reading ranges of the tags are about 11m and 15m when they are attached to a metallic object.

An Enhanced Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Privacy (강한 인증과 프라이버시를 보장하는 개선된 초경량 RFID 인증 프로토콜)

  • Jeon, Dong-Ho;Kim, Young-Jae;Kwon, Hye-Jin;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.81-91
    • /
    • 2009
  • Recently, Chein et al proposed the ultralightweight strong authentication and strong integrity (SASI)protocol, where the tag requrires only simple bitwise operations. Since the tag does not support random number generator to generate a challenge nonce, an attacker can replay old messages and impersonate reader. However, all of the previous ultralightweight authentication schemes are vlunerable to various attacks: de-synk, eavesdropping, impersonating, tracking, DoS, disclosure etc. we analyze the problems of previous proposed ultrlightweight protocols, to overcome these security problems by using PRNG on the tag. Therefore, in this paper we propose a new lightweight RFID mutual authentication protocol that provides random number generator and bitwise operations, a security and an efficiency of the proposed schme analyze.

A Study on Container Monitoring Loaded into the Hold in Maritime Logistics (해상운송 환경에서 IP-RFID 기술을 이용한 선박 홀드에 적재된 컨테이너 상태 모니터링에 관한 연구)

  • Kim, Tae-Hoon;Choi, Sung-Pill;Moon, Young-Sik;Lee, Byung-Ha;Jung, Jun-Woo;Park, Byung-Kwon;Kim, Jae-Joong;Choi, Hyung-Rim
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1446-1455
    • /
    • 2016
  • The recent increase of fresh farm products, hazardous cargos, and high-priced goods in marine transportation has caused an increased demand of cargo owners and shipping companies with regard to the monitoring of the location and state of cargo. To meet this increase, numerous technologies are being studied for the monitoring of the cargo state. Cargo containers on a ship are loaded on a ship's deck and in a ship's hold, which is located under the deck. However, Since the developed technologies mostly transfer the container status information that collected by mobile communication, it costs a lot to install communication infrastructure on ship. And the ship's hold is completely sealed with a cover, and communication with the reader positioned at the ship's bridge is difficult. Therefore, most existing studies on container monitoring on ships have focused on the monitoring of containers loaded on a ship's deck. Accordingly, this study suggested system configuration for the monitoring of containers in a ship's hold using IP-RFID technology. The suggested system configuration was tested on an actual ship under navigation, and the test results are given in this study. The test results verified that the monitoring of containers in a ship's hold using IP-RFID technology is effective.

Automation of Inventory Checking System for Outdoor Warehouse (야외창고 재고실사 자동화를 위한 시스템 개발)

  • Bae, Sung Moon;Han, Kwan Hee;Lee, Hwa Yong;Hong, Kum Suk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.3
    • /
    • pp.138-144
    • /
    • 2018
  • Inventory inspection is an important task to eliminate the inconsistency between real assets and inventory management systems, and it is performed periodically at the site. In the case of a large-sized property, it is mainly managed in an outdoor workshop or a warehouse. However, due to the large area of the outdoor area, it is relatively difficult to identify the quantity and location of the property and is also vulnerable to theft. To solve this problem, we proposed a method and system for performing a warehouse inventory inspection using an unmanned aerial vehicle (UAV) and Bluetooth low energy (BLE) beacons. The proposed method has the following advantages. First of all, if we carry out inventory inspection by utilizing UAV, we can minimize user's effort compared to existing methods. The method of recognizing the asset by attaching the BLE beacon is more costly than using the existing RFID technology, but it is advantageous because the recognition distance is increased and the battery life of the tag is drastically increased. We also designed a BLE beacon reader for the system and implemented a prototype to show the feasibility of the proposed system. The prototype is based on Genuino 101, which is a kind of arduino, and adds HM-10 and Neo-6m modules to provide Bluetooth and GPS functions. The BLE beacon reader was tested in outdoor, and attached in drone. We also developed an inventory checking system based on the web to display results of inventory checking. The proposed approach enables the users to automate the operation of inventory checking on an outdoor warehouse.

Idle Slots Skipped Mechanism based Tag Identification Algorithm with Enhanced Collision Detection

  • Su, Jian;Xu, Ruoyu;Yu, ShiMing;Wang, BaoWei;Wang, Jiuru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2294-2309
    • /
    • 2020
  • In this article, a new Aloha-based tag identification protocol is presented to improve the reading efficiency of the EPC C1 Gen2-based UHF RFID system. Collision detection (CD) plays a vital role in tag identification process which determines the efficiency of anti-collision protocols since most Aloha-based protocols optimize the incoming frame length based on the collisions in current frame. Existing CD methods are ineffective in identifying collision, resulting in a degradation of identification performance. Our proposed algorithm adopts an enhanced CD (ECD) scheme based on the EPC C1 Gen2 standard to optimize identification performance. The ECD method can realize timely and effective CD by detecting the pulse width of the randomly sent by tags. According to the ECD, the reader detects the slot distribution and predicts tag cardinality in every collision slot. The tags involved in each collision slot are identified by independently assigned sub-frames. A large number of numerical results show that the proposed solution is superior to other existing anti-collision protocols in various performance evaluation metrics.

Efficient heuristic of vehicle routing problem for container shuttle service (컨테이너 터미널 반출입 프로세스 운영효율 향상에 관한 연구)

  • Kim, Jung-Woo;Shin, Jae-Young;Chung, Chang-Yun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2009.06a
    • /
    • pp.131-132
    • /
    • 2009
  • The container terminal can be divided into berth-side, yard area and gate. Until now, many studies related to the improvement of the terminal operation efficiency have been focused on berth and yard productivity. With regard to gate operation, existing studies were examined from hardware perspectives such as non-stop system using RFID(Radio Frequency Identification) or OCR(Optical Character Reader). Relatively little research has been curried out on the improvement of the gate in/out process. In this regard, this paper proposes the method to improve the terminal operation efficiency.

  • PDF

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.