• Title/Summary/Keyword: Wireless Barcode

Search Result 18, Processing Time 0.024 seconds

Propulsion Control of a Small Maglev Train with Linear Synchronous Motors (선형 동기 전동기가 있는 축소형 자기부상열차의 추진 제어)

  • Park, Jin-Woo;Kim, Chang-Hyun;Park, Doh-Young
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.1838-1844
    • /
    • 2011
  • In this paper, the propulsion control of a high-speed maglev train is studied. Electromagnetic suspension is used to levitate the vehicle, and linear synchronous motors (LSM) are used for propulsion. In general, a low-speed maglev train uses a linear induction motor (LIM) for propulsion that is operated under 300[km/h] due to the power-collecting and end-effect problem of LIM. In case of the high-speed maglev train over 500[km/h], a linear synchronous motor (LSM) is more suitable than LIM because of a high-efficiency and high-output properties. An optical barcode positioning system is used to obtain the absolute position of the vehicle due to its wide working distance and ease of installation. However, because the vehicle is working completely contactless, the position measured on the vehicle has to be transmitted to the ground for propulsion control via wireless communication. For this purpose, Bluetooth is used and communication hardware is designed. A propulsion controller using a digital signal processor (DSP) in the ground receives the delayed position information, calculates the required currents, and controls the stator currents through inverters. The performance of the implemented propulsion control is analyzed with a small maglev train which was manufactured for experiments, and the applicability of the high-speed maglev train will be explored.

  • PDF

A RFID Multi-Authentication Method for Logistics Systems (물류 시스템에 적합한 RFID 다중 인증방법)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.313-319
    • /
    • 2009
  • Recently the RFID system, which can recognize multiple tags simultaneously through wireless communication, is emerging as a new technology that can replace the barcode system. Furthermore, related industries are carrying out active research on tags and authentication protocols with guaranteed security that are widely applicable to logistics, distribution, etc. The present study proposes a protocol with enhanced security by introducing the concept of RBAC to the authentication protocol, and a method with lower security for effective mass authentication. The proposed method is advantageous in that it guarantees security against spoofing attack, traffic analysis, replay attack, etc. based on hash function.

A Tourism Curation Platform Build Based on Local Area Wireless Communication (근거리무선통신 기반 관광 큐레이션 플랫폼 구축)

  • Seo, Gui-Bin;Sung, Nak-Jun;Yum, HyoSub;Hong, Min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.154-157
    • /
    • 2016
  • 최근 스마트폰의 보급과 더불어 근거리 무선 통신의 발달로 인해 다양한 서비스들이 연구 개발되고 있다. 한국에 방문하는 외래 관광객 수는 꾸준히 증가하고 있는 추세이며, 이 중 중국인 관광객은 2013년 기준 전체 방한 외국인 관광객 중 약 35.5%를 차지하였다. 중국인 관광객의 82.8%가 쇼핑을 목적에 두고 있으며, 그 중 향수, 화장품, 의류 항목에 가장 많은 여행시간을 투자하고 있다. 또한 방한 중국인 관광객 중 대다수가 인터넷을 사용하여 관광 정보를 입수 하고 있지만, 이러한 정보를 편리하게 제공할 서비스는 부족한 상황이다. 본 논문에서는 현재 발달되고 있는 근거리 무선 통신 중 NFC와 Beacon을 활용하여 안드로이드 기반의 관광 큐레이션 플랫폼을 구현 하였다. NFC 태그를 활용하여 쇼핑, 관광 관련 정보 및 정확한 제품 및 서비스 정보를 제공하고, Beacon을 이용하여 매장정보 및 각종 마케팅 프로모션과 이벤트 정보를 수신하도록 하였다. 추가적으로 현재 많이 사용되고 있는 Zxing 라이브러리를 활용한 QRCode 및 Barcode 리더기를 활용하여 스캔을 통한 제품 정보를 확인 가능하도록 구현하였다.

Study on architecture of u-number system and network (BcN에서 유비쿼터스주소 체계 및 네트워크구조 연구)

  • Chung, Hee-Chang;Lee, Yeong-Ro
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.12
    • /
    • pp.71-76
    • /
    • 2005
  • The 070-VOIP service were began to support system of E.164 and an IP address service. The address system was proposed how an convergence of E.164 address system was worked with an EPC and an IP address to the multimedia convergence service within the integration of wireless and wireline. In future, it was presented the way that the end user could use an integrated address system to be based on E.164 in BcN networks. An expansibility will be easy to all things are put into in knowledge that u- address system use an integrated address system to the basis of E.164 system.

AI Smart Factory Model for Integrated Management of Packaging Container Production Process

  • Kim, Chigon;Park, Deawoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.148-154
    • /
    • 2021
  • We propose the AI Smart Factory Model for integrated management of production processes in this paper .It is an integrated platform system for the production of food packaging containers, consisting of a platform system for the main producer, one or more production partner platform systems, and one or more raw material partner platform systems while each subsystem of the three systems consists of an integrated storage server platform that can be expanded infinitely with flexible systems that can extend client PCs and main servers according to size and integrated management of overall raw materials and production-related information. The hardware collects production site information in real time by using various equipment such as PLCs, on-site PCs, barcode printers, and wireless APs at the production site. MES and e-SCM data are stored in the cloud database server to ensure security and high availability of data, and accumulated as big data. It was built based on the project focused on dissemination and diffusion of the smart factory construction, advancement, and easy maintenance system promoted by the Ministry of SMEs and Startups to enhance the competitiveness of small and medium-sized enterprises (SMEs) manufacturing sites while we plan to propose this model in the paper to state funding projects for SMEs.

A New Low-Cost Mutual Authentication Protocol in RFID based on Hash Function (해시함수 기반의 새로운 저비용 RFID 상호인증 프로토콜)

  • Bae, Woo-Sik;Lee, Jong-Yun;Kim, Sang-Choon
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.1
    • /
    • pp.175-185
    • /
    • 2011
  • Recently RFID systems have been introduced in place of barcode systems to industries such as logistics, distribution, and manufacturing. Due to security vulnerabilities in wireless communication between the reader and tags, however, the authentication protocols for the communication have also been researched extensively. In order to solve the vulnerability of previously proposed protocols, this paper thus proposes an authentication protocol that satisfies the security requirements in the RFID system and minimizes the quantity of computation such as random number generation, transmitting the micro-time of databases. In addition, it is expected that the proposed cross authentication protocol is safe against replay attack, spoofing attack, traffic analysis, and eavesdropping attack when it is applied to the RFID system. Also, it has advantages such as providing a high level of security at a lower manufacturing cost.

  • PDF

Hash based Secure RFID Authentication Protocol for User Privacy Protection (사용자 프라이버시 보호를 위한 해쉬 기반의 안전한 RFID 인증 프로토콜)

  • Lee, Han-Kwon;Cho, Tae-Kyung;Yoo, Hyun-Joong;Park, Byoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.33-40
    • /
    • 2007
  • RFID, a non-contact wireless identification technology is being noticed as a technology to alternate barcode system in distribution industry and general industry. Despite of merit of RFID, there are issues to be solved for practical use. One of them, which are most important, is resolution of user's information protection. RFID system without security function bears risk exposing personal data and user's privacy. In this paper, we propose mutual authentication protocol for RFID system in order to solve this security issue. This study aimed to protect user's privacy by providing dynamic ID for tag through authentication protocol safe from security threats. Information being transmitted between backend, reader and tag has no direct connection with ID of tag, and it conducts authentication process using one-way hash function, which prevents attacker's obtaining of tag information using information being transmitted.

  • PDF

Secure and Efficient Database Searching in RFID Systems using Tag-Grouping Based on Hash-Chain (RFID 시스템에서 Hash-Chain기반 Tag-Grouping을 이용한 안전하고 효율적인 데이터베이스 검색)

  • Lee, Byeung-Ju;Song, Chang-Woo;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.9-17
    • /
    • 2009
  • RFID (Radio Frequency Identification) is a next generation technology that will replace barcode. RFID can identify an object by reading ID inside a RFID tag using radio frequency. However, because a RFID tag replies its unique ID to the request of any reader through wireless communication, it is vulnerable to attacks on security or privacy through wiretapping or an illegal reader's request. The RFID authentication protocol has been studied actively in order to solve security and privacy problems, and is used also in tag search. Recently, as the number of tags is increasing in RFTD systems and the cost of data collection is also rising, the importance of effective tag search is increasing. This study proposed an efficient search method that solved through ta9 group the problem of large volume of database computation in Miyako Ohkubo's hash chain mechanism, which meets requirements for security and privacy protection. When we searched first the group of tags with access rate of 5 or higher in a database with 100,000 records, search time decreased by around 30%.