• Title/Summary/Keyword: Related Tags

Search Result 138, Processing Time 0.027 seconds

Implementation of RFID Data Transmission System using Wireless LAN (무선LAN 기반 RFID 데이터 전송시스템 구현)

  • 김종호;김영길;백수열
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1055-1059
    • /
    • 2004
  • A RFID(Radio Frequency Identification) system is a kind of radio frequency communication system and a branch of automatic data collection system. RFID system consists of RFID tags(or transponders) and RFID readers(controllers). This paper deals with the wireless communication that acquires tag IDs through RFID readers, and show the implementation of the target system which transmits tag IDs and related information to the server on the Internet through the wireless local area network. Today's RFID systems are usually implemented with the wired communication environment. In this paper, however, RFID system is effectively realized with the widely deployed wireless local area network and various RFID data can be collected by the readers which are communicating with the wireless access points of the local area network. Through the Internet, users also can have easy access to the server on the web and retrieve, analyze, and utilize tags' information.

Implementation of Improved Frame Slotted ALOHA Algorithm for Fast Tag Collection in an Active RFID System (고속 태그 수집을 위한 개선된 능동형 RFID 시스템용 프레임 Slotted ALOHA 알고리즘 구현)

  • Kim, Ji-Tae;Kang, Byeong-Gwon;Lee, Kang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.9
    • /
    • pp.598-605
    • /
    • 2014
  • In this paper, we suggest a modified slotted ALOHA algorithm for fast tag collection in active RFID system and implement the reader and tag operation using CC2530 chip of Texas Instruments Co. to prove the performance of the proposed algorithm. In the present international standard related with active RFID including ISO/IEC 18000-7 the reader sends sleep command to each tag after successful obtaining tag's information. Meanwhile, in this paper, the tags decide to sleep after checking the second command from the reader resulting in enormously decreased tag collection time. We tested the proposed algorithm with 30 tags over the range of 0-3m and the results showed that the tag collection process was completed in 400msec at average. And 30 tags are collected in one second with 99.7% and the collection rate is 100% in 2m distance between reader and tag. The collection rates are 99.94% and 99.7% for distance 2.5m and 3m, respectively. The average collection rate is 99.91% over all range and it is concluded that the proposed algorithm is enough to apply to real fields.

G-Pedigree and G-code System of RFID-based Development for Forward & Reverse Logistics Management (순물류와 역물류 관리에 적합한 RFID 기반의 G-Pedigree 시스템과 G-code 체계 개발)

  • Hwang, Bo-Hyun;Yun, Jong-Ho;Choi, Myung-Ryul
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.3
    • /
    • pp.112-118
    • /
    • 2010
  • This paper propose G-code and G-Pedigree system that are development based on the e-Pedigree and EPC, and RFID solutions for logistics management is proposed. The proposed G-Pedigree system to include the forward logistics and reverse logistics all logistics and management systems are appropriate for the event, with security features, security and accessibility of critical data was strengthened. The proposed G-code systems and the EPC code of the existing RFID readers, tags can be applied to, the more you can manage the logistics-related information.

  • PDF

XML-BASED BIOINFORMATIC SYSTEMS (XML 기반의 생물정보학시스템)

  • Sin Jong Hyeon;Jeong Mu Yeong
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.301-305
    • /
    • 2002
  • Bioinformatics can beexplained as the science of developing algorithms, applicatiou tools, and computer databases and so on, for the purpose of supporting and enhancing biological research. Bioinformatic information systems (BIS) typically handle large data sets and the amount of the data goes up exponentially. Another impediment to easy extraction and retrieval of genomic data in BIS is the need to access different sites for similar information. Recently. there has been some attempts to integrate bioinformatics data in the World Wide Web (WWW) among the bioinformatics community by the internet computing technology. However, the work to integrate bioinformatics data on a universal platform has some problems because of the lack of standard, terminologies, semantics, and ontologies about bioinformatics. In this paper, an XML-based BIS architecture is proposed as an integrated BIS framework. The XML and related technologies allow the creation of meaningful information tags to exchange data between various databases as a standard format, and to create more simple interfaces. This integrated BIS framework has bioinformatic architectural components which is used in the Corporate Information Factory (CIF) method.

  • PDF

A Design of the Platform Technology for the Smart Shopping Mall Using NFC: A Software Engineering Approach

  • Je, Seung-Mo;Seo, Kyungryong
    • Journal of Multimedia Information System
    • /
    • v.6 no.1
    • /
    • pp.43-48
    • /
    • 2019
  • An IoT-based server system for store management was developed in this study. Its client-server structure having a product categorization function allows the system to read the NFC tags attached to individual products and provides information about them to customers automatically. The system also provides an effective promotional effect as it not only offers necessary information about the items the customers are seeking but also displays the advertisements related to them. This server system was designed specifically designed for the use in a smart shopping Mall or a department store so that the store owners can manage their sales operation more effectively while their customers enjoy shopping more conveniently. It is expected that the technology used for this IoT-utilized server system can be one of the efficient and effective platform technologies in the current and future store management systems.

Renewable energy trends and relationship structure by SNS big data analysis (SNS 빅데이터 분석을 통한 재생에너지 동향 및 관계구조)

  • Jong-Min Kim
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.55-60
    • /
    • 2022
  • This study is to analyze trends and relational structures in the energy sector related to renewable energy. For this reason, in this study, we focused on big data including SNS data. SNS utilizes the Instagram platform to collect renewable energy hash tags and use them as a word embedding method for big data analysis and social network analysis, and based on the results derived from this research, it will be used for the development of the renewable energy industry. It is expected that it can be utilized.

Implementation of Association Rules Creation System from GML Documents (GML 문서에서 연관규칙 생성 시스템 구현)

  • Kim, Eui-Chan;Hwang, Byung-Yeon
    • Journal of Korea Spatial Information System Society
    • /
    • v.8 no.1 s.16
    • /
    • pp.27-35
    • /
    • 2006
  • As the increasing interest about geographical information, such researches and applied fields become wide. OGC(Open GIS Consortium) developed GML(Geography Markup Language) which is adopted XML(extensible Markup Language) in GIS field. In various applied field, GML is used and studied continuously. This paper try to find out the meaningful rules using Apriori algorithm from GML documents, one of the data mining techniques which is studied based on existing XML documents There are two ways to find out the rules. One is the way that find out the related rules as extracting the content in GML documents, the other find out the related rules based on used tags and attributes. This paper describes searching the rules through two ways and shows the system adopted two ways.

  • PDF

Building an Annotated English-Vietnamese Parallel Corpus for Training Vietnamese-related NLPs

  • Dien Dinh;Kiem Hoang
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.103-109
    • /
    • 2004
  • In NLP (Natural Language Processing) tasks, the highest difficulty which computers had to face with, is the built-in ambiguity of Natural Languages. To disambiguate it, formerly, they based on human-devised rules. Building such a complete rule-set is time-consuming and labor-intensive task whilst it doesn't cover all the cases. Besides, when the scale of system increases, it is very difficult to control that rule-set. So, recently, many NLP tasks have changed from rule-based approaches into corpus-based approaches with large annotated corpora. Corpus-based NLP tasks for such popular languages as English, French, etc. have been well studied with satisfactory achievements. In contrast, corpus-based NLP tasks for Vietnamese are at a deadlock due to absence of annotated training data. Furthermore, hand-annotation of even reasonably well-determined features such as part-of-speech (POS) tags has proved to be labor intensive and costly. In this paper, we present our building an annotated English-Vietnamese parallel aligned corpus named EVC to train for Vietnamese-related NLP tasks such as Word Segmentation, POS-tagger, Word Order transfer, Word Sense Disambiguation, English-to-Vietnamese Machine Translation, etc.

  • PDF

Security Framework for RFID-based Applications in Smart Home Environment

  • Konidala, Divyan M.;Kim, Dae-Young;Yeun, Chan-Yeob;Lee, Byoung-Cheon
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.111-120
    • /
    • 2011
  • The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers. There has also been much talk of a very popular RFID application: a refrigerator/bookshelf that can scan and list out the details of its items on its display screen. Realizing such an application is not as straight forward as it seems to be, especially in securely deploying such RFID-based applications in a smart home environment. Therefore this paper describes some of the RFID-based applications that are applicable to smart home environments. We then identify their related privacy and security threats and security requirements and also propose a secure approach, where RFID-tagged consumer items, RFID-reader enabled appliances (e.g., refrigerators), and RFID-based applications would securely interact among one another. At the moment our approach is just a conceptual idea, but it sheds light on very important security issues related to RFID-based applications that are beneficial for consumers.