• Title/Summary/Keyword: Tag Location Tracking

Search Result 64, Processing Time 0.022 seconds

Smart-tracking Systems Development with QR-Code and 4D-BIM for Progress Monitoring of a Steel-plant Blast-furnace Revamping Project in Korea

  • Jung, In-Hye;Roh, Ho-Young;Lee, Eul-Bum
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.149-156
    • /
    • 2020
  • Blast furnace revamping in steel industry is one of the most important work to complete the complicated equipment within a short period of time based on the interfaces of various types of work. P company has planned to build a Smart Tracking System based on the wireless tag system with the aim of complying with the construction period and reducing costs, ahead of the revamping of blast furnace scheduled for construction in February next year. It combines the detailed design data with the wireless recognition technology to grasp the stage status of design, storage and installation. Then, it graphically displays the location information of each member in relation to the plan and the actual status in connection with Building Information Modeling (BIM) 4D Simulation. QR Code is used as a wireless tag in order to check the receiving status of core equipment considering the characteristics of each item. Then, DB in server system is built, status information is input. By implementing BIM 4D Simulation data using DELMIA, the information on location and status is provided. As a feature of the S/W function, a function for confirming the items will be added to the cellular phone screen in order to improve the accuracy of tagging of the items. Accuracy also increases by simultaneous processing of storage and location tagging. The most significant effect of building this system is to minimize errors in construction by preventing erroneous operation of members. This system will be very useful for overall project management because the information about the position and progress of each critical item can be visualized in real time. It could be eventually lead to cost reduction of project management.

  • PDF

Advanced Indoor Location Tracking Using RFID (RFID를 이용한 개선된 실내 위치 추적)

  • Joo, Won-lee;Kim, Hyo-Sun;Jung, Yeong-Ah;Hong, Yeon-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.425-430
    • /
    • 2017
  • RFID is a technology that uses radio frequency to read information in tags attached to objects or people. Because it reads the information without contact when tracking the location using tags in a RFID system, there can be errors between the actual position and measured position. In this paper, three methods (the method of radiation pattern, the method of the median value, and the method using both the radiation pattern and median value) are proposed to identify the location of objects or people using the RFID technique. The location identification system based on RFID was constructed and tags were arranged in a square pattern. The real location and experimentally predicted location of an object containing a reader were compared to confirm the error. Instead of the existing papers that obtained the approximately location of a reader by calculating the center of gravity of all tags read by that reader, in this study, the predicted location was obtained by the median value and the radiation pattern. This study validated which method was the most efficient among the three methods proposed in this paper through the data of the read tags. As a result, the method of the median value had the smallest error among those assessed.

Case Study on Location Tracking System using RFID Active Tag and Improvement of Scheduling System in Semiconductor Manufacturing (반도체 제조업에서의 RFID Active 태그를 이용한 위치추적 시스템 구축 사례 및 스케줄링 개선 방안에 관한 연구)

  • Kim, Gahm-Yong;Chae, Myoung-Sin;Yu, Jae-Eon
    • IE interfaces
    • /
    • v.21 no.2
    • /
    • pp.229-236
    • /
    • 2008
  • Recently, ubiquitous computing paradigm considers as a tool for making innovation and competitive strength in manufacturing industry like other industries. Particularly, the location-based service that enables us to trace real-time logistics make effective management of schedules for inventory control, facilities and equipments, jobs planning, and facilitate the processes of information management and intelligence, which relate with ERP and SCM in organizations. Our study tries to build the location-based system for products of semiconductors in manufacturing place and suggests the good conditions and effective tracking procedures for positions of products. Our study show that the system is good for the saving of time in tracking products, however, it has to be improved in terms of accuracy. The study verifies the application of RFID technology in manufacturing industry and suggests the improvement of photograph process through RFID. In addition, our research introduces the future operation of FAB in semiconductors' processes that relate with real-time automation and RFID in manufacturing company.

Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 RFID 인증 프로토콜의 안전성 분석과 개선)

  • Kim, Jiye;Won, Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.581-591
    • /
    • 2016
  • RFID(Radio Frequency IDentification) is a key technology in ubiquitous computing and is expected to be employed in more fields in the near future. Nevertheless, the RFID system is vulnerable to attacks by eavesdropping or altering of the messages transmitted in wireless channels. In 2013, Oh et al. proposed a mutual authentication protocol between a tag and a reader in RFID systems. Their protocol is designed to resist location tracking for privacy protection. However, all tags and readers use only one network-wide key in their protocol and tags are usually vulnerable to physical attacks. We found that their protocol is still vulnerable to tag/reader impersonation attacks and location tracking if an attacker obtains the network-wide key from a tag. In this paper, we propose a security improved authentication protocol for privacy protection in RFID systems. In addition, we demonstrate that the proposed scheme is efficient in terms of computation and communication costs.

Tracking of Yellowtail Seriola quinqueradiata Migration Using Pop-up Satellite Archival Tag (PSAT) and Oceanic Environments Data (위성전자표지와 해양환경자료를 이용한 방어(Seriola quinqueradiata) 이동경로 추적 연구)

  • Kim, Changsin;Yang, Jigwan;Kang, Sujin;Lee, Seung-Jong;Kang, Sukyung
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.54 no.5
    • /
    • pp.787-797
    • /
    • 2021
  • Yellowtail Seriola quinqueradiata tagged with a Pop-up Satellite Archival Tag (PSAT) was released off the coast of near the Moseulpo, Jeju Island and the ecological data during about 40 days was obtained. However, it is difficult to determine the spatial location of underwater ecological data. To improve the accuracy of estimating the Yellowtail migration route using temperature, suitable background field of the oceanic environment data was evaluated and used for input data. After developing of the tracking algorithm for migration route estimation, three experiment cases were estimated with ecological data among the surface layer, the mixed layer, and the whole water column. All tracking experiments move from western to eastern Jeju Island. Additionally, tracking experiment using 3D ocean numerical model reveal that it is possible to estimate the migration route using the fish ecological data of the entire water column. Therefore, using a large number of ecological data and a high-accuracy ocean numerical model to estimate the migration route seems to be a way to increase the accuracy of the tracking experiment. Moreover, the tracking algorithm of this study can be applied to small pelagic fishery using small archival electronic tags to track the migration route.

Tag Trajectory Generation Scheme for RFID Tag Tracing in Ubiquitous Computing (유비쿼터스 컴퓨팅에서 RFID 태그 추적을 위한 태그 궤적 생성 기법)

  • Kim, Jong-Wan;Oh, Duk-Shin;Kim, Kee-Cheon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.1-10
    • /
    • 2009
  • One of major purposes of a RFID system is to track moving objects using tags attached to the objects. Because a tagged object has both location and time information expressed as the location of the reader, we can index the trajectory of the object like existing spatiotemporal objects. More efficient tracking may be possible if a spatiotemporal trajectory can be formed of a tag, but there has not been much research on tag trajectory indexes. A characteristic that distinguishes tags from existing spatiotemporal objects is that a tag creates a separate trajectory in each reader by entering and then leaving the reader. As a result, there is a trajectory interruption interval between readers, in which the tag cannot be located, and this makes it difficult to track the tag. In addition, the point tags that only enter and don't leave readers do not create trajectories, so cannot be tracked. To solve this problem, we propose a tag trajectory index called TR-tree (tag trajectory R-tree in RFID system) that can track a tag by combining separate trajectories among readers into one trajectory. The results show that TR-tree, which overcomes the trajectory interruption superior performance than TPIR-tree and R-tree.

Supplementation of the Indoor Location Tracking Techniques Based-on Load-Cells Mechanism (로드셀 기반의 실내 위치추적 보완 기법)

  • YI, Nam-Su;Moon, Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.1-8
    • /
    • 2016
  • Current indoor intrusion detection and location tracking methods have the weakness in seamless operations in tracking the objective because the object must possess a communicating device and the limitation of the single cell size (approximate $100cm{\times}100cm$) exits. Also, the utilization of CCTV technologies show the shortcomings in tracking when the object disappear the area where the CCTV is not installed or illumination is not enough for capturing the scene (e.g. where the context-awarded system is not installed or low illumination presents). Therefore, in this paper we present an improved in-door tracking system based on sensor networks. Such system is built on a simulated scenario and enables us to detect and extend the area of surveillance as well as actively responding the emergency situation. Through simulated studies, we have demonstrated that the proposed system is capable of supplementing the shortcomings of signal cutting, and of estimating the location of the moving object. We expect the study will improve the better analysis of the intruder behavior, the more effective prevention and flexible response to various emergency situations.

A Time Interval Index for Tracking Trajectories of RFID Tags : SLR-Tree (RFID 태그의 이력 추적을 위한 시간 간격 색인 : SLR-트리)

  • Ryu, Woo-Seok;Ahn, Sung-Woo;Hong, Bong-Hee;Ban, Chae-Hoon;Lee, Se-Ho
    • Journal of KIISE:Databases
    • /
    • v.34 no.1
    • /
    • pp.59-69
    • /
    • 2007
  • The trajectory of a tag in RFID system is represented as a interval that connects two spatiotemporal locations captured when the tag enters and leaves the vicinity of a reader. Whole trajectories of a tag are represented as a set of unconnected interval because the location of the tag which left the vicinity of a reader is unknown until it enters the vicinity of another reader. The problems are that trajectories of a tag are not connected. It takes a long time to find trajectories of a tag because it leads to searching the whole index. To solve this problem, we propose a technique that links two intervals of the tag and an index scheme called SLR-tree. We also propose a sharing technique of link information between two intervals which enhances space utilization of nodes, and propose a split policy that preserves shared-link information. And finally, we evaluate the performance of the proposed index and prove that the index processes history queries efficiently.

Design and implementation of low-power tracking device based on IEEE 802.11 (IEEE 802.11 기반 저전력 위치 추적 장치의 설계 및 구현)

  • Son, Sanghyun;Kim, Taewook;Baek, Yunju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.466-474
    • /
    • 2014
  • According to wireless network technology and mobile processors performance were improved, the small wireless mobile device such as smart phones has been widely utilized. The mobile devices can be used GPS information, thereby the services based on location information was increased. GPS was impossible to provide location information in indoor and signal shading environment, and the tracking systems based on short distance wireless communication are required infrastructure. The IEEE 802.11 based tracking system is possible estimation using APs, however the tracking device is exhausted battery power seriously. In this paper, we propose IEEE 802.11 based low-power tracking system. We reduced power consumption from channel scanning and network connection. For performance evaluation, we designed and implemented the tracking tag device, and measured power consumption of the device. As the simulation result, we confirmed that the power consumption was reduced 46% compare to the standard execution.

An RFID Distance Bounding Protocol Based on Cryptographic Puzzles Providing Strong Privacy and Computational Efficiency (강한 프라이버시와 연산 효율성을 제공하는 암호 퍼즐 기반 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.9-18
    • /
    • 2012
  • In 2010, Pedro et al. proposed RFID distance bounding protocol based on WSBC cryptographic puzzle. This paper points out that Pedro et al.'s protocol not only is vulnerable to tag privacy invasion attack and location tracking attack because an attacker can easily obtain the secret key(ID) of a legal tag from the intercepted messages between the reader and the tag, but also requires heavy computation by performing symmetric key operations of the resource limited passive tag and many communication rounds between the reader and the tag. Moreover, to resolve the security weakness and the computation/communication efficiency problems, this paper also present a new RFID distance bounding protocol based on WSBC cryptographic puzzle that can provide strong security and high efficiency. As a result, the proposed protocol not only provides computational and communicational efficiency because it requires secure one-way hash function for the passive tag and it reduces communication rounds, but also provides strong security because both tag and reader use secure one-way hash function to protect their exchanging messages.