• Title/Summary/Keyword: System ID

Search Result 1,006, Processing Time 0.025 seconds

Long Distance Transmission System of Tag's ID in RFID System (전자인식 시스템에서 택 ID의 원거리 전송 시스템)

  • Kim, Dong-Hun;Jo, Hyeong-Guk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.63-67
    • /
    • 2009
  • In RFID system, Tag's Identification data is processed in host computer by application program. Example of application program is parking administration program, library state program etc.. Tag's ID that is recognized in reader is inputted to the Host computer. Application program of computer searches data in DB of computer such as Tag ID. After finding the same ID, host computer send to control command to driver H/W in accordance with application purpose. But, It need to confirm in long distance whether achievement process is acted normally. There will be the 2 methods, when we monitors the process in long distance. One is wired monitoring system, another is wireless monitoring system. Among wire method, internet communication network is useful. RFID system manufacture first in this treatise. RFID system Embody using EM4095 chip that is doing 125KHz by carrier wave. Tag's characteristic ID is sent in remote place through module that use W3100A chip. This system Manufacture, and data send-receive confirmed using simple application program. Reception confirm by result, and pictures show by whole system and each part. And a control program explained of each part.

  • PDF

A control system of each product with a remote controller for Multi-vision which is composed of several products (Multi-Vision으로 구성된 제품들의 리모컨을 통한 개별 제어 시스템)

  • Bae, Sang-Ho;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.149-152
    • /
    • 2011
  • A Multi-Vision needs an image adjust of each product to make the same picture quality for all products when it's installed. Owing to this reason need individual control. This document request indivisual control method for each product with the Remote controller. To realize this method need make Set ID and Picture ID on the UI and need daisy chain of cable to connect Remocon code(IR Signal) In to Out, After allocation the Set ID for each product. Picture ID of the product which want to change picture quality make equal to Set ID. And the product which is same Set ID and Picture ID is only controlled through decoding of Remocon code to Scaler.

  • PDF

The secured mobile wallet system using by integrated ID (통합 아이디를 이용한 안전한 모바일 월렛 시스템)

  • Nam, Choon-Sung;Jeon, Min-Kyung;Shin, Dong-Ryeol
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.9-20
    • /
    • 2015
  • Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.

A Study on the Coordinate-based Intersection ID Composition System Using Space Filling Curves (공간 채움 곡선을 활용한 좌표 기반의 교차로 ID 구성 체계에 관한 연구)

  • Lee, Eun il;Park, Soo hong;Kim, Duck ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.6
    • /
    • pp.124-136
    • /
    • 2019
  • Autonomous driving at intersections requires assistance by exchanging traffic information between traffic objects due to the intersection of various vehicles and complicated driving environment. For this reason, traffic information exchange between adjacent intersections is required, but the node ID representing the intersection in the Korean standard node link system have limitations in updating intersections and identifying location information of intersections through IDs due to the configuration system including serial numbers. In this paper, we designed a coordinate-based intersection ID configuration system created by processing and merging two-dimensional coordinates of intersections to include location information in the intersection ID. In order to verify the applicability of the proposed intersection ID, we applied a new intersection ID to domestic intersections and confirmed that there are no duplicate values. Coordinate-based intersection ID reduces data size by 60% compared to existing node ID, and enables spatial queries such as searching for nearby intersections and extracting intersections in specific areas in the form of boxes without GIS tools. Therefore, coordinate-based intersection ID is expected to be more scalable and utilized than existing node ID.

A study of the STEP-based Data Repository and P&ID-3D CAD Model Connected Pilot System at Nuclear Power Plant (원전 대상의 STEP 기반 데이터 저장소 및 P&ID와 3차원 CAD 모델 연계에 관한 연구)

  • 안호준;조광종;박찬국;한순홍;안경익;최영준
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 2004.05a
    • /
    • pp.395-400
    • /
    • 2004
  • This study is that STEP based Data Repository of APR1400 Nuclear Power Plant Reactor Coolant System is developed. The STEP based Data Repository is accessed by Web-based and an attribute data of Reactor Coolant System Equipment is offered. Also, a P&ID drawing file & 3D CAD Model of Reactor Coolant System is loaded. The P&ID drawing file of Reactor Coolant System Equipment Model is connected with 3D CAD Model file. This 2D/3D CAD Model connected Prototype system confirms a real layout of Reactor Coolant System.

  • PDF

Electronic Identity Wallet System to Provide User-Centric ID Management Facilities (사용자 중심 ID 관리 기능을 제공하는 전자 ID 지갑 시스템)

  • Jo, Yeong-Seop;Jin, Seung-Heon
    • Electronics and Telecommunications Trends
    • /
    • v.23 no.4
    • /
    • pp.10-18
    • /
    • 2008
  • 본 고에서는 사용자의 자기 정보 통제권을 강화시키는 전자 ID 지갑 시스템을 기술한다. 전자 ID 지갑 시스템은 ID 정보 제공자로부터 ID 정보 소비자로 유통되는 사용자의 정보를 사용자가 직접 제어할 수 있는 기능을 제공한다. 또한 전자 ID 지갑 시스템은 사용자가 가입한 사이트, 사용자의 크리덴셜 및 사용자의 데이터 공유 정보 등을 사용자에게 모두 카드-기반의 인터페이스로 제공하여 사용자에게 편리함과 일관성을 제공한다. 전자 ID 지갑 시스템은 현재의 웹 환경뿐만 아니라 사용자의 참여와 공유가 더욱 더 중요해지는 웹 2.0 환경에 적합한 사용자 중심 ID 관리 시스템이다.

Multi-Factor Authentication System based on Software Secure Card-on-Matching For Secure Login (안전한 로그인을 위한 소프트 보안카드 기반 다중 인증 시스템)

  • Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.3
    • /
    • pp.28-38
    • /
    • 2009
  • Login process uses both ID and password information to authenticate someone and to permit its access privilege on system. However, an attacker can get those ID and password information by using existing packet sniffing or key logger programs. It cause privacy problem as those information can be used as a hacking and network attack on web server and web e-mail system. Therefore, a more secure and advanced authentication mechanism should be required to enhance the authentication process on existing system. In this paper, we propose a multi-factor authentication process by using software form of secure card system combined with existing ID/Password based login system. Proposed mechanism uses a random number generated from the his/her own handset with biometric information. Therefore, we can provide a one-time password function on web login system to authenticate the user using multi-factor form. Proposed scheme provide enhanced authentication function and security because it is a 'multi-factor authentication mechanism' combined with handset and biometric information on web login system.

Tweet Acquisition System by Considering Location Information and Tendency of Twitter User (트위터 사용자의 위치정보와 성향을 고려한 트윗 수집 시스템)

  • Choi, Woosung;Yim, Junyeob;Hwang, Byung-Yeon
    • Spatial Information Research
    • /
    • v.22 no.3
    • /
    • pp.1-8
    • /
    • 2014
  • While SNS services such as Twitter or Facebook are rapidly growing, research for the SNS analysis has been concerned. Especially, twitter reacts to social issues in real-time so that it is used to get useful experimental data for researchers of social science or information retrieval. However, it is still lack of research on the methodology to collect data. Therefore, this paper suggests the tweet acquisition system by considering tendency of twitter user oriented location-based event and political social event. First the system acquires tweets including information of location and keyword about event and secure IDs for acquisition of political social event. Then we plan ID-analyzer to classify the tendency of users. In addition for measuring reliability of ID-analyzer, it acquires and analyzes the tweet by using high-ranked ID. In analyses result, top-ranked ID shows 88.8% reliability, 2nd-ranked ID shows 76.05% and ID-analyzer shows 77.5%, it shortens collection time by using minority ID.

Efficient Tag Authentication Scheme using Tag ID Identification Bits in RFID Environment (RFID 환경에서 태그 ID의 식별 비트를 이용한 효율적인 태그 인증 기법)

  • Jang, Bong-Im;Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.195-202
    • /
    • 2011
  • RFID(Radio Frequency IDentification) is a system to identify objects and its usage is being extended to distribution, healthcare, and air&port etc. RFID is a contactless system environment, and reducing tag authentication time is important because multiple tags are identified at the same time. Studies about RFID system so far is, however, mostly to improve security vulnerability in the tag authentication process. Therefore, this paper suggests an efficient scheme to decrease the time of tag authentication which is also safe for the security of tag authentication process. The proposed scheme cuts down on the tag ID search time because it searches only the classified relevant ID in the database, which is one of many components of RFID system, by using identification bits for tag ID search. Consequently, the suggested scheme decreases process time for tag ID authentication by reducing the processing time and the load of the database. It also brings performance improvement of RFID system as it improves the energy applicability of passive tag.

The blocking channel to reduce the performance decrease using the low correlation with cyclic delay scheme in LED-ID system (LED-ID 시스템에서 채널 차단에 따른 성능 열화를 줄이기 위한 저 상관 순환 지연 기법)

  • Lee, Kyu-Jin;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.319-325
    • /
    • 2015
  • We proposed the blocking channel to reduce the performance decrease using the low correlation with cyclic delay scheme in LED-ID system. LED-ID is based on the visible light to transmit the data. However, It is occurred the block channel by structure or environment of indoor for light of straightness. LED-ID system is degraded the performance by the block channel as loss of data, and burst error. To solve the block channel, the proposed system is overcome the burst error by low correlation among data, which is able to obtain the maximize time diversity gain to improve the performance of BER by cyclic delay scheme. The BER performance is evaluated by computer simulation according to channel parameter. The simulation results shows that proposed system gives much better performance than conventional system and constant cyclic delay scheme system.