• Title/Summary/Keyword: RFID Tag Group

Search Result 37, Processing Time 0.024 seconds

Development of an electronic sow liquid feeding system using RFID (1) - Development and performance test of the prototype - (RFID이용 전자식 모돈 개체별 액상급이기 개발(1) - RFID를 이용한 모돈 액상급이기 제작 및 성능시험 -)

  • Kim, Hyuck Joo;Hong, Jong Tae;Yu, Byeong Kee;Kim, Sang Cheol;Choi, Kyu Hong;Chang, Hong Hee
    • Journal of Biosystems Engineering
    • /
    • v.37 no.6
    • /
    • pp.373-384
    • /
    • 2012
  • Purpose: In EU, the animal welfare regulations are strengthening. Also, in Korea, for strengthening of animal protection laws, animal welfare farm certification scheme is being prepared to enforce. To get the certification of animal welfare farm, especially for sows, individual specific feeding in sow group is necessary in accordance with the animal welfare regulation. Also, liquid feeding is reported to be more effective for farrowing as well as dry sow. Therefore, in this study, a electronic liquid sow feeder using RFID which could be fed to farrowing sow simultaneously is developed. Methods : We manufactured a prototype of appropriate elements which were evaluated in the preliminary test for selecting RFID tag, supply pump, mixing type, etc. With the prototype, the performance test for liquid feeding gilt was done in group raising training barn. Results : The performance test result shows the C.V.(coefficient of variation) of liquid mixing and feeding is 0.77~1.97% and 2.4~5.3%, respectively, which means the system could feed sows uniformly. The feeding time of pneumatically activated ball valve is 2 seconds per 0.9 kg of liquid feed. The eating time for gilt were 65 seconds in average. Conclusions : The prototype could feed sow uniformly, and deliver the liquid feed 9 times for a sow continuously. Also, total eating time for a sow was 18 minutes in one visit to the prototype of feeding station.

Improvement and Performance Analysis of Hybrid Anti-Collision Algorithm for Object Identification of Multi-Tags in RFID Systems (RFID 시스템에서 다중 태그 인식을 위한 하이브리드 충돌방지 알고리즘의 개선 및 성능 분석)

  • Choi, Tae-Jeong;Seo, Jae-Joon;Baek, Jang-Hyun
    • IE interfaces
    • /
    • v.22 no.3
    • /
    • pp.278-286
    • /
    • 2009
  • The anti-collision algorithms to identify a number of tags in real-time in RFID systems are divided into the anti-collision algorithms based on the Framed slotted ALOHA that randomly select multiple slots to identify the tags, and the anti-collision algorithms based on the Tree-based algorithm that repeat the questions and answer process to identify the tags. In the hybrid algorithm which is combined the advantages of these algorithms, tags are distributed over the frames by selecting one frame among them and then identified by using the Query tree frame by frame. In this hybrid algorithm, however, the time of identifying all tags may increase if many tags are concentrated in a few frames. In this study, to improve the performance of the hybrid algorithm, we suggest an improved algorithm that the tags select a specific group of frames based on the earlier bits of the tag ID so that the tags are distribute equally over the frames. By using the simulation and mathematical analysis, we show that the suggested algorithm outperforms traditional hybrid algorithm from the viewpoint of the number of queries per frame and the time of identifying all tags.

Hybrid anti-collision method for RFID System with the consideration of the average throughput (평균 처리율을 고려한 RFID 시스템의 하이브리드 충돌 방지 기법)

  • Choi, Sung-Yun;Lee, Je-Ho;Kim, Sung-Hyun;Tchah, Kyun-Hyon
    • Journal of IKEEE
    • /
    • v.14 no.2
    • /
    • pp.24-32
    • /
    • 2010
  • Slotted-ALOHA and Binary-tree method are researched for the anti-collision for RFID system. However, it is required of the rapid recognition time for all tags and the reduction of the system complexity. In this paper. the hybrid anti-collision method is proposed to solve the problems. The RFID reader with the hybrid anti-collision method groups the tags with the number which makes the maximum system throughput, then it reads each group by slotted-ALOHA method. By the computer simulation results, it is found that the hybrid method improves the tag identification time and the system throughput together with the comparison to other anti-collision methods. Therefore, the proposed hybrid anti-collision method will enhance the RFID system performance.

A Secure Yoking-Proof Protocol Providing Offline Verification (오프라인 검증을 지원하는 안전한 요킹증명 프로토콜)

  • Ham, Hyoungmin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.113-120
    • /
    • 2021
  • RFID (Radio Frequency Identification) yoking authentication provides methods scanning a pair of RFID tags with a reader device and verifying them to ensure the physical proximity of objects. In the first yoking proof protocols, a verifier connected to a reader device online is essential to verify the yoking proof, and this condition limits the environment in which yoking proof can be applied. To solve this limitation, several studies have been conducted on offline yoking proof protocol that does not require the online connection between a reader and a verifier. However, the offline yoking proof protocols do not guarantee the basic requirements of yoking proof, and require relatively more operations on the tag compared to the previous yoking proof protocols. This paper proposes an efficient offline yoking proof protocol that supports offline verification without the need for an online verifier. The proposed protocol provides a secure yoking proof with fewer number of operations than the existing ones, and it also can be extended to the group proof for more than a pair of tags without additional devices. The analysis in this paper shows that the proposed protocol provides offline verification securely and effectively.

Acoustic Monitoring and Localization for Social Care

  • Goetze, Stefan;Schroder, Jens;Gerlach, Stephan;Hollosi, Danilo;Appell, Jens-E.;Wallhoff, Frank
    • Journal of Computing Science and Engineering
    • /
    • v.6 no.1
    • /
    • pp.40-50
    • /
    • 2012
  • Increase in the number of older people due to demographic changes poses great challenges to the social healthcare systems both in the Western and as well as in the Eastern countries. Support for older people by formal care givers leads to enormous temporal and personal efforts. Therefore, one of the most important goals is to increase the efficiency and effectiveness of today's care. This can be achieved by the use of assistive technologies. These technologies are able to increase the safety of patients or to reduce the time needed for tasks that do not relate to direct interaction between the care giver and the patient. Motivated by this goal, this contribution focuses on applications of acoustic technologies to support users and care givers in ambient assisted living (AAL) scenarios. Acoustic sensors are small, unobtrusive and can be added to already existing care or living environments easily. The information gathered by the acoustic sensors can be analyzed to calculate the position of the user by localization and the context by detection and classification of acoustic events in the captured acoustic signal. By doing this, possibly dangerous situations like falls, screams or an increased amount of coughs can be detected and appropriate actions can be initialized by an intelligent autonomous system for the acoustic monitoring of older persons. The proposed system is able to reduce the false alarm rate compared to other existing and commercially available approaches that basically rely only on the acoustic level. This is due to the fact that it explicitly distinguishes between the various acoustic events and provides information on the type of emergency that has taken place. Furthermore, the position of the acoustic event can be determined as contextual information by the system that uses only the acoustic signal. By this, the position of the user is known even if she or he does not wear a localization device such as a radio-frequency identification (RFID) tag.

A Study on Integrated Anti-counterfeiting Strategy to stop the forgery for Korean cosmetics in China (중국에서 한국 화장품의 위조근절을 위한 통합적 위조방지 전략 연구)

  • Koh, Joong Hyun
    • International Commerce and Information Review
    • /
    • v.18 no.4
    • /
    • pp.81-112
    • /
    • 2016
  • About 60 percent of cosmetic products sold in the dominant Taobao internet shopping mall proved recently to be counterfeit products made in China. This paper is to investigate the anti-counterfeiting strategies to clean up fake goods for Korean cosmetics which have been exported to China. Using the scienter rule the paper classified the forgery action for Korean cosmetics into four broad groups - counterfeit, piracy, illegally distributed product, and brand prior register. This paper suggested interior company's anti-counterfeiting strategies for each group, focusing on the construction for an integrated anti-counterfeiting system including consumer's rationality through the government cooperation between Korea and China.

  • PDF

A study on unmanned watch system using ubiquitous sensor network technology (유비쿼터스 센서 네트워크 기술을 활용한 무인감시체계 연구)

  • Wee, Kyoum-Bok
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.271-303
    • /
    • 2009
  • "Ubiquitous sensor network" definition is this-Someone attaches electro-magnetic tag everything which needs communication between man to man, man to material and material to material(Ubiquitous). By using attached every electro-magnetic tag, someone detects it's native information as well as environmental information such as temperature, humidity, pollution and infiltration information(Sensor). someone connects it realtime network and manage generated information(Network). 21st century's war is joint combined operation connecting with ground, sea and air smoothly in digitalized war field, and is systematic war provided realtime information from sensor to shooter. So, it needs dramatic development on watch reconnaissance, command and control, pinpoint strike etc. Ubiquitous computing and network technologies are essential in national defense to operate 21st century style war. It is possible to use many parts such as USN combined smart dust and sensor network to protect friend unit as well as to watch enemy's deep area by unmanned reconnaissance, wearable computer upgrading soldier's operational ability and combat power dramatically, RFID which can be used material management as well as on time support. Especially, unmanned watch system using USN is core part to transit network centric military service and to get national defense efficiency which overcome the dilemma of national defense person resource reducing, and upgrade guard quality level, and improve combat power by normalizing guardian's bio rhythm. According to the test result of sensor network unmanned watch system, it needs more effort and time to stabilize because of low USN technology maturity and using maturity. In the future, USN unmanned watch system project must be decided the application scope such as application area and starting point by evaluating technology maturity and using maturity. And when you decide application scope, you must consider not only short period goal as cost reduction, soldier decrease and guard power upgrade but also long period goal as advanced defense ability strength. You must build basic infra in advance such as light cable network, frequency allocation and power facility etc. First of all, it must get budget guarantee and driving force for USN unmanned watch system project related to defense policy. You must forwarded the USN project assuming posses of operation skill as procedure, system, standard, training in advance. Operational skill posses is come from step by step application strategy such as test phase, introduction phase, spread phase, stabilization phase and also repeated test application taking example project.

  • PDF