• Title/Summary/Keyword: asset identification

Search Result 48, Processing Time 0.022 seconds

A study on the application of RFID for ammunition management system (탄약관리 시스템에 RFID 적용방안 연구)

  • Park, Jin-Won;Choi, Seok-Cheol
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.2
    • /
    • pp.13-27
    • /
    • 2005
  • The most portion of the Korean Army's ammunition management system has achieved efficiency and automation based on the Ammunition Information System (AIS). However, a few limitations for the automation system constructed at each site, exist in verifying the real time situation. At the present state of technology, the asset visibility of the located ammunitions is basically achieved. On the other hand, the ammunitions in the middle of transportation are difficult to achieve asset visibility. The RFID(Radio Frequency Identification) technology could be an appropriate solution in these circumstances. Therefore, the objective of this paper is to apply the RFID to improve defense asset management, total asset visibility and ammunition distribution efficiency in the ammunition management system of the Korean Army.

Design of the Identifier Structure for Ubiquitous National Product Asset Management (U-국가물품자산관리를 위한 식별코드체계 설계)

  • Kim, Sun-Ho;Yun, Ji-Ho;Kim, Jin-Yong;Ann, Chong-Hwan
    • IE interfaces
    • /
    • v.20 no.2
    • /
    • pp.227-234
    • /
    • 2007
  • The national product identifier(NPI) currently used in the national product asset management system does not accommodate ISO or EPC standards due to the limitation of tag memory. For this reason, we propose a new NPI which accommodates not only ISO item identification standards but also the memory capacity of ISO tags. First of all, memory structures of ISO/IEC 18000-6C and EPC tags are analyzed from the view point of product identifier structure. Second, ISO/IEC 15459 and EPC identification standards as item identifier structures for the product asset management are analyzed. Third, based on these analyses, the NPI used for the current RFID-based product asset management system is analyzed and its problems are presented. Finally, a new NPI structure is proposed suitable for ISO/IEC 18000-6C and ISO/IEC 15459.

A Study on the Implementation of RFID for Korean Defense (RFID 군 적용방안 연구)

  • Lee, Jea-Youl;Kim, Seong-Won;Choi, Sang-Young
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.1
    • /
    • pp.58-72
    • /
    • 2005
  • RFID(Radio Frequency Identification) is one of key technologies in ubiquitous computing. RFID system comprises tag, reader, and computer application. The tag is a small electronic chip, which is attached to a thing such as item, pallet, container. The reader has an tiny antenna obtaining the identification information of the things by radio frequency, and provides the information to the computer application for a business. In this paper we have proposed the military application of RFID and its implementation policy for the Korean armed forces. We believe that The principle application area would be logistics TAV(total asset visibility) and resource management, and the implementation should be achieved step by step considering the advancement of RFID technology and government policy.

Design and Prototype Implementation of Museum Asset Management System Using Mobile RFID Devices (모바일 RFID 장치를 이용한 박물관 관리 시스템 설계 및 구현)

  • Kim, Young-Il;Cheong, Tae-Su
    • Proceedings of the CALSEC Conference
    • /
    • 2005.11a
    • /
    • pp.78-84
    • /
    • 2005
  • As the research activities related to 'Ubiquitous Computing' whose concept was introduced by Mark Weiser are growing, RFID(Radio Frequency Identification) technology has recently gained attention as a technology to advance the ubiquitous computing and a lot of related researches are also in progress. Research works done so far are mainly linked to the situation that the research outputs apply to meet the requirements for asset tracking and data sharing with partners over supply chain by using fixed RFID readers. However, it is essential that users have access to real-time information about the tagged objects and services whenever and wherever they want in the era of ubiquitous computing, so mobile devices-including PDA, smart phone, cellular phone, etc - which are equipped with an RFID reader can be regarded as an essential terminal for users living in ubiquitous computing environment. As far as the application with mobile devices are concerned, there are many considerations due to their limited capabilities of data processing, battery consumption and so on. In this paper, we review the generic RFID network model and introduce the revised RFID network model in consideration of incorporation with mobile devices equipped with an RFID reader. Also, we derive the requirements for software embedded within an RFID- enabled mobile terminal and then discuss essential components for implementation. Moreover, we develop the applications for asset management at museum by using mobile RFID network model.

  • PDF

The Operational Method of the RFID Identification System for National Product Asset Management (국가물품자산관리를 위한 RFID 식별코드체계 운용방안)

  • Kim, Sun-Ho;Kim, Jin-Yong;Park, Jeong-Jae;Song, Ju-Hyung;Kim, Hyun-Min;Ann, Chong-Hwan
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.3
    • /
    • pp.19-31
    • /
    • 2007
  • In this research, we propose the operational method of the RFID-based NPI (National Product Identifier) which can manage product assets for the Korean government in the future. First of all, we present the operational concept of the national product asset management. Second, we suggest the structure of the NPI which accommodates ISO/IEC 15459 and the method to encode NPI and related data to ISO/IEC 18000-6C tags. Finally, we propose the operational business processes to generate and manage NPI in the stages of product procurement and product asset management.

  • PDF

Digital Asset Analysis Methodology against Cyber Threat to Instrumentation and Control System in Nuclear Power Plants (원자력발전소의 디지털계측제어시스템의 사이버보안을 위한 디지털 자산분석 방법)

  • Koo, In-Soo;Kim, Kwan-Woong;Hong, Seok-Boong;Park, Geun-Ok;Park, Jae-Yoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.839-847
    • /
    • 2011
  • Instrumentation & Control(I&C) System in NPP(Nuclear Power Plant) plays a important role as the brain of human being, it performs protecting, controling and monitoring safety operation of NPP. Recently, the I&C system is digitalized as digital technology such as PLC, DSP, FPGA. The different aspect of digital system which use digital communication to analog system is that it has potential vulnerability to cyber threat in nature. Possibility that digital I&C system is defected by cyber attack is increasing day by day. The result of cyber attack can be adverse effect to safety function in NPP. Therefore, I&C system required cyber security counter-measures that protect themselves from cyber threat efficiently and also cyber security design should be taken into consideration at concept stage in I&C system development process. In this study, we proposed the digital asset analysis method for cyber security assessment of I&C system design in NPP and we performed digital asset analysis of I&C system by using the proposed method.

Study on the Disaster Prevention System for Wooden Cultural Assets Using USN -Focusing on the System Checking the Malfunction of Flame Detector- (USN을 이용한 목조문화재 방재시스템에 관한 연구 -불꽃감지기 오작동 확인시스템을 중심으로-)

  • Back, Min-Ho;Kim, Jeong-Ho
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.5
    • /
    • pp.49-54
    • /
    • 2010
  • The wooden cultural assets have the characteristics such as the fast spread of flame and leading to total destruction. Therefore, there is a need for a system for early countermeasure of recognized problem, along with the technological response for accurately recognizing the situation, for the prevention and early suppression of fire. To utilize such technology for detecting the situation through the latest ubiquitous technology and for a quick response to suppress fire, the ubiquitous sensor network (USN) technology, flame detector, image sensor, USN-based cultural asset disaster prevention management application case and malfunction identification system realization were examined in this study and the study result was presented focusing on the flame detector malfunction identification system for the ubiquitous-type cultural asset disaster prevention system.

A review of recent research advances on structural health monitoring in Western Australia

  • Li, Jun;Hao, Hong
    • Structural Monitoring and Maintenance
    • /
    • v.3 no.1
    • /
    • pp.33-49
    • /
    • 2016
  • Structural Health Monitoring (SHM) has been attracting numerous research efforts around the world because it targets at monitoring structural conditions and performance to prevent catastrophic failure, and to provide quantitative data for engineers and infrastructure owners to design a reliable and economical asset management strategy. In the past decade, with supports from Australian Research Council (ARC), Cooperative Research Center for Infrastructure and Engineering Asset Management (CIEAM), CSIRO and industry partners, intensive research works have been conducted in the School of Civil, Environmental and Mining Engineering, University of Western Australia and Centre for Infrastructural Monitoring and Protection, Curtin University on various techniques of SHM. The researches include the development of hardware, software and various algorithms, such as various signal processing techniques for operational modal analysis, modal analysis toolbox, non-model based methods for assessing the shear connection in composite bridges and identifying the free spanning and supports conditions of pipelines, vibration based structural damage identification and model updating approaches considering uncertainty and noise effects, structural identification under moving loads, guided wave propagation technique for detecting debonding damage, and relative displacement sensors for SHM in composite and steel truss bridges. This paper aims at summarizing and reviewing the recent research advances on SHM of civil infrastructure in Western Australia.

Identification of the Movement of Underlying Asset in Real Option Analysis: Studies on Industrial Parametric Table (실물옵션 적용을 위한 산업별 기초자산 확률과정추정)

  • Lee, Jeong-Dong;Gang, A-Ri;Jeong, Jong-Uk
    • Proceedings of the Technology Innovation Conference
    • /
    • 2004.02a
    • /
    • pp.222-245
    • /
    • 2004
  • This paper has an intention of proposing useful parametric tables of each industry group within Korea. These parametric tables can be insightful criteria for those who are dealing with the exact valuation of company, technology or industry through Real Option Analysis (ROA) since the identification of the movement of underlying asset is the very first step to be done. To give the exact estimations of parameters and the most preferred model in each industry group, we cover topics on ROA, stochastic process, and parametric estimation method like Generalized Method of Moments (GMM) and Maximum Likelihood Estimation (MLE). Additionally, specific industry groups, such as, Internet service group and mobile telecommunication service group defined independently in this paper are also examined in terms of its property of movement with the suggesting of the most fitting stochastic model.

  • PDF

Network Topology Discovery with Load Balancing for IoT Environment (IoT환경에서의 부하 균형을 이룬 네트워크 토폴로지 탐색)

  • Park, Hyunsu;Kim, Jinsoo;Park, Moosung;Jeon, Youngbae;Yoon, Jiwon
    • Journal of KIISE
    • /
    • v.44 no.10
    • /
    • pp.1071-1080
    • /
    • 2017
  • With today's complex networks, asset identification of network devices is becoming an important issue in management and security. Because these assets are connected to the network, it is also important to identify the network structure and to verify the location and connection status of each asset. This can be used to identify vulnerabilities in the network architecture and find solutions to minimize these vulnerabilities. However, in an IoT(Internet of Things) network with a small amount of resources, the Traceroute packets sent by the monitors may overload the IoT devices to determine the network structure. In this paper, we describe how we improved the existing the well-known double-tree algorithm to effectively reduce the load on the network of IoT devices. To balance the load, this paper proposes a new destination-matching algorithm and attempts to search for the path that does not overlap the current search path statistically. This balances the load on the network and additionally balances the monitor's resource usage.