• Title/Summary/Keyword: TAG

Search Result 3,090, Processing Time 0.03 seconds

TagPlus: A Retrieval System using Synonym Tag in Folksonomy (TagPlus: 폭소노미에서 동의어 태그를 이용한 검색 시스템)

  • Lee, Sun-Sook;Yong, Hwan-Seung
    • Journal of Digital Contents Society
    • /
    • v.8 no.3
    • /
    • pp.255-262
    • /
    • 2007
  • Collaborative tagging describes the process by which many users add metadata in the form of keywords to shared content. Recently, collaborative tagging has grown in popularity on the web, on sites that allow users to tag bookmarks, photographs, videos and other content. In this paper, we analyze the structure and basic knowledge of collaborative tagging systems as well as their dynamical aspects. We also present a retrieval system, TagPlus, using synonym tag that is derived from WordNet database. Specifically, TagPlus, a synonym tag based system has users retrieve images from Flickr system. The proposed system show the images tagged by not only the tag that users input but also the synonyms that are synonyms with the tag.

  • PDF

Improvement of an Identified Slot Sacn-Based Active RFID Tag Collection Algorithm (인식 슬롯 스캔 기반 능동형 RFID 태그 수집 알고리즘 개선)

  • Yoon, Won-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.3
    • /
    • pp.199-206
    • /
    • 2013
  • This paper proposes a modified tag collection algorithm that improves the drawback of the identified slot scan-based tag collection algorithm presented in a previous paper to improve the tag collection performance in active RFID systems. The previous identified slot scan-based tag collection algorithm is optimized in situations where all the tags store the fixed size of data, so it could not result in a good performance improvement with tags having the variable size of data. The improved tag collection algorithm proposed in this paper first collects the slot size information required for the data transmission from each tag via the identified slot scan phase, and then performs the tag collection phase using the information, which resolves the problem of the previous identified slot scan-based tag collection algorithm. The simulation results for performance evaluation showed that the proposed tag collection algorithm resulted in the almost same tag collection performance as the previous algorithm when all the tags have the same size of data and led a large improvement of the tag collection performance in ISO/IEC 18000-7 unlike the previous algorithm when each tag has a random size of data.

An implementation of Smart RFID Tag using temperature sensor for agri-food distribution management (온도센서를 이용한 농.식품 유통관리를 위한 Smart RFID Tag 개발)

  • Lee, Chang-Won;Lee, Seung-Joon;Jung, Kyung-Kwon;Lee, Hyun-Kwan;Eom, Ki-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.231-234
    • /
    • 2011
  • Recently, the smart RFID tag technology which can measure external changing environment is globally interesting. In this paper, development of the Smart RFID tag using temperature sensor was represented. Smart RFID tag is basically comprised of antenna which has its bandwidth of 13.56Mhz, temperature sensors and data processing controller. Antenna design and smaller PCB production can be used to agri-food wrap. Since the smart RFID tag is distributed as an attachment to agri-food wrap, consumer can check temperature changes in the distribution process. Because temperature change check in real time, food confirm the status of transportation and the freshness. Also, smart RFID tag can be applied to proposed smart refrigerator.

  • PDF

A Secure and Efficient RFID Tag Search Protocol Protecting Mobile Reader's Privacy (이동형 리더의 프라이버시를 보호하는 안전하고 효율적인 RFID 태그 검색 프로토콜)

  • Choi, Hyun-Woo;Yeo, Don-Gu;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.109-117
    • /
    • 2010
  • Recently, study on RFID Tag Searching technique which is used to find a specific tag in particular tag group were developed continuously. RFID tag searching technique can be applicate in various fields such as product management, finding children, and electronic anklet. To implement a RFID tag search system, RFID tag searching protocol should be considered various security threats such as reader and tag tracking, privacy, etc. For implementing a safe RFID tag lookup system, it is important to consider the potential security threats such as the tag tracking problem, and the privacy of the owner of the tag reader problem. There exists an RFID tag lookup system that satisfies a few security requirements, but the privacy of the owner of the tag reader problem has still been left unsolved, and even if it were solved, it requires a considerable amount of cryptographic operations to be performed which results in a decrease in performance. This paper proposes a system that does not degrade the performance while solving the privacy of the owner of the tag reader problem.

A Study on Implementation of Passive RFID Tag System Using A Capacitive method (Capacitive방식을 이용한 Passive RFID Tag System 구현)

  • 배명수;여영호;손수국
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.199-202
    • /
    • 2002
  • This paper is about the implementation of Passive RFID(Radio Frequency Identification) tag system using a capacitive method, and explains the design and circuit's structure of this system. Fundamentally the capacitive RFID tag system consists of a tag reader, a passive tag and a host computer. And then this paper shows the system's prototype which analyzes a specification, and suggests the passive RFID system as a new method which manufactures a low cost tag system easily

  • PDF

A Method to Protect the Information of Tag Using Forced Collision Mechanism in RFID System (RFID 시스템에서 강제 충돌을 이용한 태그 정보 보호 기법)

  • Park Ju-Sung;Kang Jeonil;Nyang Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.25-33
    • /
    • 2005
  • We propose a method to protect the tag's information from illegal reader in RFID system. In this method, a special tag called ownership tag makes intentionally collisions during singulation. By the forced collision of an ownership tag a reader can obtain the information of ordinary tags. Whereas a reader can not find my information on tag's ID without the ownership tag.

MarSel : LD based tagSNP Selection System for Large-scale SNP Haplotype Dataset (MarSel : 대용량 SNP 일배체형 데이터에 대한 연관불균형기반의 tagSNP 선택 시스템)

  • Kim Sang-Jun;Yeo Sang-Soo;Kim Sung-Kwon
    • The KIPS Transactions:PartA
    • /
    • v.13A no.1 s.98
    • /
    • pp.79-86
    • /
    • 2006
  • Recently the tagSNP selection problem has been researched for reducing the cost of association studies between human's diversities and SNPs. General approach for this problem is that all of SNPs are separated into appropriate blocks and then tagSNPs are chosen in each block. Marsel in this paper is the system that involved the concept of linkage disequilibrium for overcoming the problem that the existing block partitioning approaches have short of biological meanings. In most approaches, the contiguous regions, which recombinations have LD coefficient |D'| and then tagSNP selection step is performed. And MarSel guarantees the minimum tagSNP selection using entropy-based optimal selection algorithm when tagSNPs are chosen in each block, and enables chromosome-level association studies using efficient memory management technique when input is very large-scale dataset that is impossible to be processed in the existing systems.

An Efficient Tag Sleep Method for Improving Tag Collection Performance in Active RFID Systems (능동형 RFID 시스템에서 태그 수집 성능 향상을 위한 효율적인 태그 슬립 기법)

  • Yoon, Won-Ju;Chung, Sang-Hwa;Park, Shin-Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7B
    • /
    • pp.686-693
    • /
    • 2009
  • In this paper, we propose an efficient tag sleep method utilizing empty time slots for improving the tag collection performance in active RFID systems. In the proposed tag sleep method, the reader detects the occurrence of empty time slots by carrier sensing and utilizes the wasted empty time slots to transmit sleep commands to the collected tags throughout the framed slotted aloha-based tag collection process, resulting in reducing the time required for tag collection. Via the simulation experiments, we evaluated the performance of the tag collection applied with the proposed tag sleep method, compared with that of the basic tag collection. The simulation results showed that the tag collection applied with the proposed tag sleep method could reduce the average tag collection time by 12.28%, 12.30%, and 13.31 %, for the framed slotted aloha with the fixed 128 time slots and 256 time slots, and the dynamic framed slotted aloha anticollision protocols, respectively.

Bayesian Cognizance of RFID Tags (Bayes 풍의 RFID Tag 인식)

  • Park, Jin-Kyung;Ha, Jun;Choi, Cheon-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.70-77
    • /
    • 2009
  • In an RFID network consisting of a single reader and many tags, a framed and slotted ALOHA, which provides a number of slots for the tags to respond, was introduced for arbitrating a collision among tags' responses. In a framed and slotted ALOHA, the number of slots in each frame should be optimized to attain the maximal efficiency in tag cognizance. While such an optimization necessitates the knowledge about the number of tags, the reader hardly knows it. In this paper, we propose a tag cognizance scheme based on framed and slotted ALOHA, which is characterized by directly taking a Bayes action on the number of slots without estimating the number of tags separately. Specifically, a Bayes action is yielded by solving a decision problem which incorporates the prior distribution the number of tags, the observation on the number of slots in which no tag responds and the loss function reflecting the cognizance rate. Also, a Bayes action in each frame is supported by an evolution of prior distribution for the number of tags. From the simulation results, we observe that the pair of evolving prior distribution and Bayes action forms a robust scheme which attains a certain level of cognizance rate in spite of a high discrepancy between the Due and initially believed numbers of tags. Also, the proposed scheme is confirmed to be able to achieve higher cognizance completion probability than a scheme using classical estimate of the number of tags separately.

Development of an Intelligent Illegal Gambling Site Detection Model Based on Tag2Vec (Tag2vec 기반의 지능형 불법 도박 사이트 탐지 모형 개발)

  • Song, ChanWoo;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.211-227
    • /
    • 2022
  • Illegal gambling through online gambling sites has become a significant social problem. The development of Internet technology and the spread of smartphones have led to the proliferation of illegal gambling sites, so now illegal online gambling has become accessible to anyone. In order to mitigate its negative effect, the Korean government is trying to detect illegal gambling sites by using self-monitoring agents or reporting systems such as 'Nuricops.' However, it is difficult to detect all illegal sites due to limitations such as a lack of staffing. Accordingly, several scholars have proposed intelligent illegal gambling site detection techniques. Xu et al. (2019) found that fake or illegal websites generally have unique features in the HTML tag structure. It implies that the HTML tag structure can be important for detecting illegal sites. However, prior studies to improve the model's performance by utilizing the HTML tag structure in the illegal site detection model are rare. Against this background, our study aimed to improve the model's performance by utilizing the HTML tag structure and proposes Tag2Vec, a modified version of Doc2Vec, as a methodology to vectorize the HTML tag structure properly. To validate the proposed model, we perform the empirical analysis using a data set consisting of the list of harmful sites from 'The Cheat' and normal sites through Google search. As a result, it was confirmed that the Tag2Vec-based detection model proposed in this study showed better classification accuracy, recall, and F1_Score than the URL-based detection model-a comparative model. The proposed model of this study is expected to be effectively utilized to improve the health of our society through intelligent technology.