• Title/Summary/Keyword: RFID data management

Search Result 259, Processing Time 0.028 seconds

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

A Study on the Efficiency of the EPCIS using Simulation (시뮬레이션을 이용한 EPCIS의 효율화 방안에 관한 연구)

  • Li, Zhong-Shi;Lee, Chang-Ho
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2010.11a
    • /
    • pp.349-355
    • /
    • 2010
  • EPCIS(EPC Information Services) system is a core component of EPCglobal Architecture Framework offering information of the freights, the time of awareness and the location of awareness on the EPCglobal Network. The role of EPCIS is to exchange information based on EPC. There are four kinds of event data which are object event data, aggregation event data, quantity event data, and transaction event data. These EPCIS events data are stored and managed in EPCIS repository. This paper leads to separate a in-out data overload of integrated EPCIS event and suggests the method to effectively manage EPCIS repository for exchanging data smoothly. In order to verify a effectiveness, we measure the performance of the system using a simple testing simulation by comparing existing method and suggested method.

  • PDF

A Handwritten Document Digitalization Framework based Defect Management System in Educational Facilities (수기문서 전자화 프레임워크 기반의 교육시설 하자관리 시스템)

  • Son, Bong-Ki
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.9 no.3
    • /
    • pp.1-11
    • /
    • 2010
  • In the construction industry, IT based information system has been diversely applied to increase productivity. Although IT device such as PDA, RFID, Barcode, wireless network and web camera has been introduced to gather information in construction site, the effect of the IT device is limited, because of bringing about additional works of engineer. In this paper, we proposed a defect management system which is based on handwritten document digitalization framework for introducing applicability of new IT device, digital pen. By the proposed system, we can effectively gather and input defect information to defect management system by using digital pen and paper like conventional way. Applying the data gathering device, digital pen to defect management, it is able to increase productivity by improving work process, building up and utilizing defect information database of good quality.

A Study on the comparison between MS-SQL and ALTIBASE in EPCIS (EPCIS에서 MS-SQL과 ALTIBASE의 비교에 관한 연구)

  • Dan, Da;Song, Young-Keun;Kwon, Dae-Woo;Lee, Doo-Yong;Li, Zhong-Shi;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.2
    • /
    • pp.161-166
    • /
    • 2010
  • EPC Information Services (EPCIS) is an EPCglobal standard designed to enable EPC-related data sharing within and across supply chain. The EPCIS standard defines standard interfaces to enable EPC-related data to be captured and subsequently to be queried using a set of service operations and an associated data model. There are two kinds of EPCIS data: event data and master data. Event data is created in the process of carrying out business processes. Traceability of goods across supply chain is based on event data. Therefore, each company must have an event data. This study compared he difference between MS-SQL(DRDBMS) and ALTIBASE(MMDBMS) for data storage. We compared the difference between two database management in many respects such as insert time and select time. We come to a conclusion that ALTIBASE is more efficient than MS-SQL.

Construction Information Process Using Digital Pen -Focused on Defect management System- (디지털 펜 입력 시스템을 활용한 건설 정보 처리에 관한 연구 -하자관리 시스템을 중심으로-)

  • Park, Gyu-Tae;Jung, Young-Chul;Nam, Hyun-Jung;Son, Bong-Ki;Kim, Tae-Hui;Kim, Gwang-Hee
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2010.05a
    • /
    • pp.135-138
    • /
    • 2010
  • In the construction industry, construction management system using information technology has been applied diversely to increase productivity. Although IT device such as PDA, RFID, Barcode, wireless network and web camera has been introduced in construction site, the usage of these device is restricted, because these cause engineer to do additional work. The suggested process using Digital Pen in this study, which can lessen engineer's additional work, get defect data promptly. Also accumulated data is utilized effectively for analyzing construction site. The purpose of this study is to introduce Digital Pen System as a means of construction data acquisition for improving productivity.

  • PDF

Design of National Product Identifier and its Encoding based on RFID (RFID기반의 국가물품식별코드체계 및 인코딩 방안 설계)

  • Kim, Jin-Yong;Park, Jung-Jae;Song, Joo-Hyung;Kim, Hyun-Min;Ann, Chong-Hwan;Kim, Sun-Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.25-40
    • /
    • 2007
  • As memory-extended RFID tags are recently developed, various types of item identification structures can be stored in the tags. In this paper, we propose a new national product identifier(NPI) which accepts not only ISO item identification standards but also the memory capacity of ISO tags. First of all, item identification structures of ISO/IEC 15459 and EPC, and memory structures of ISO/IEC 18000-6C and EPC tags are analyzed. Based on these analyses, the NPI currently used is analyzed and its problems are described from the viewpoint of standardization. To overcome the problems, a new NPI structure suitable for ISO/IEC 15459 is proposed. Finally, data related to the NPI is designed for encoding to tags.

  • PDF

Development of Multi-function Sensor Integration Module System for Smart Green Building (스마트 그린빌딩 구현을 위한 다기능 센서 통합 모듈 시스템 개발)

  • Kim, Bong-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.10
    • /
    • pp.4799-4804
    • /
    • 2013
  • Green IT technology for the growth of low-carbon green environment and future development of the new technology. Therefore, in this paper, data generated by the security module for RFID applications, smart green building Sung multi-function sensor integrated module that can be integrated environment for building monitoring and management system has been developed. The development of a thermal sensor, temperature sensor, smog sensor, CO2 sensor, O2 sensor, tension sensor and damage detection sensor module with integrated system module integrated multi-functional sensors implemented in the paper. In real-time monitoring by allowing was design and developed system that can be implemented smart green building environment for the environment inside buildings.

A Model-based Performance Study of the EPCglobal Network (모델 기반 EPCglobal 네트워크의 성능 분석)

  • Kang, Yong-Shin;Son, Kyung-Won;Lee, Yong-Han;Rhee, Jong-Tae
    • IE interfaces
    • /
    • v.24 no.2
    • /
    • pp.139-150
    • /
    • 2011
  • The EPCglobal Network is a computer network used to share product data among trading partners. It provides the supply chain with improved visibility and traceability by using Electronic Product Code (EPC), which is stored on an RFID tag. Although this network model is widely accepted as a global standard and the growth of EPCglobal-subscriber base is considerable, the EPC technology adoption process is still in its infancy. This is because some of the critical issues on this model still remain to be verified such as scalability, data management, security, privacy and the economic value of data sharing. In this paper, we focus on scalability issue among the challenges to overcome and we regard performance of the EPCglobal Network only as a track and trace query-processing cost in the network. We developed performance models consisting of three elements of the EPCglobal Network : Discovery Services (DS), EPC Information Services (EPCIS), Object Naming Services (ONS). Then we abstracted out the track and trace query execution model to evaluate performance of the overall EPCglobal Network. Finally using the proposed models, we carried out simulation analysis based on an RFID-based inbound logistics process of automobile parts. This work is an important step towards the EPC technology diffusion and provides guidelines for businesses looking to buy or build the EPCglobal Network-based systems.

Security Vulnerability of Internet of Things and Its Solution (사물인터넷 보안 문제제기와 대안)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.

Multidimensional Model for Spatiotemporal Data Analysis and Its Visual Representation (시공간데이터 분석을 위한 다차원 모델과 시각적 표현에 관한 연구)

  • Cho Jae-Hee;Seo Il-Jung
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.1
    • /
    • pp.137-147
    • /
    • 2006
  • Spatiotemporal data are records of the spatial changes of moving objects over time. Most data in corporate databases have a spatiotemporal nature, but they are typically treated as merely descriptive semantic data without considering their potential visual (or cartographic) representation. Businesses such as geographical CRM, location-based services, and technologies like GPS and RFID depend on the storage and analysis of spatiotemporal data. Effectively handling the data analysis process may be accomplished through spatiotemporal data warehouse and spatial OLAP. This paper proposes a multidimensional model for spatiotemporal data analysis, and cartographically represents the results of the analysis.

  • PDF