• Title/Summary/Keyword: chain code

Search Result 220, Processing Time 0.022 seconds

A Model-based Performance Study of the EPCglobal Network (모델 기반 EPCglobal 네트워크의 성능 분석)

  • Kang, Yong-Shin;Son, Kyung-Won;Lee, Yong-Han;Rhee, Jong-Tae
    • IE interfaces
    • /
    • v.24 no.2
    • /
    • pp.139-150
    • /
    • 2011
  • The EPCglobal Network is a computer network used to share product data among trading partners. It provides the supply chain with improved visibility and traceability by using Electronic Product Code (EPC), which is stored on an RFID tag. Although this network model is widely accepted as a global standard and the growth of EPCglobal-subscriber base is considerable, the EPC technology adoption process is still in its infancy. This is because some of the critical issues on this model still remain to be verified such as scalability, data management, security, privacy and the economic value of data sharing. In this paper, we focus on scalability issue among the challenges to overcome and we regard performance of the EPCglobal Network only as a track and trace query-processing cost in the network. We developed performance models consisting of three elements of the EPCglobal Network : Discovery Services (DS), EPC Information Services (EPCIS), Object Naming Services (ONS). Then we abstracted out the track and trace query execution model to evaluate performance of the overall EPCglobal Network. Finally using the proposed models, we carried out simulation analysis based on an RFID-based inbound logistics process of automobile parts. This work is an important step towards the EPC technology diffusion and provides guidelines for businesses looking to buy or build the EPCglobal Network-based systems.

Bayesian Analysis of Dose-Effect Relationship of Cadmium for Benchmark Dose Evaluation (카드뮴 반응용량 곡선에서의 기준용량 평가를 위한 베이지안 분석연구)

  • Lee, Minjea;Choi, Taeryon;Kim, Jeongseon;Woo, Hae Dong
    • The Korean Journal of Applied Statistics
    • /
    • v.26 no.3
    • /
    • pp.453-470
    • /
    • 2013
  • In this paper, we consider a Bayesian analysis of the dose-effect relationship of cadmium to evaluate a benchmark dose(BMD). For this purpose, two dose-response curves commonly used in the toxicity study are fitted based on Bayesian methods to the data collected from the scientific literature on cadmium toxicity. Specifically, Bayesian meta-analysis and hierarchical modeling build an overall dose-effect relationship that use a piecewise linear model and Hill model, where the inter-study heterogeneity and inter-individual variability of dose and effect such as gender, age and ethnicity are accounted. Estimation of the unknown parameters is made by using a Markov chain Monte Carlo algorithm based user-friendly software WinBUGS. Benchmark dose estimates are evaluated for various cut-offs and compared with different tested subpopulations with with gender, age and ethnicity based on these two Bayesian hierarchical models.

Internal Network Partition Security Model Based Authentication using BlockChain Management Server in Cloud Environment (클라우드 환경에서 블록체인관리서버를 이용한 인증기반 내부망 분리 보안 모델)

  • Kim, Young Soo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.434-442
    • /
    • 2018
  • Recently, the threat to the security and damage of important data leaked by devices of intranet infected by malicious code through the Internet have been increasing. Therefore, the partitioned intranet model that blocks access to the server for business use by implementing authentication of devices connected to the intranet is required. For this, logical net partition with the VDI(Virtual Desktop Infrastructure) method is no information exchange between physical devices connected to the intranet and the virtual device so that it could prevent data leakage and improve security but it is vulnerable to the attack to expose internal data, which has access to the server for business connecting a nonregistered device into the intranet. In order to protect the server for business, we suggest a blockchain based network partition model applying blockchain technology to VDI. It contributes to decrease in threat to expose internal data by improving not only capability to verify forgery of devices, which is the vulnerability of the VDI based logical net partition, but also the integrity of the devices.

Performance Modeling of an EPC Information Service System

  • Kim, So-Jung;Kang, Yong-Shin;Son, Kyung-Won;Lee, Yong-Han;Rhee, Jong-Tae;Hong, Sung-Jo
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.3
    • /
    • pp.285-293
    • /
    • 2010
  • To obtain visible and traceable information from the supply chain, HW/SW standards for the EPC global network, which process electronic product code (EPC) data read from Radio frequency identification (RFID) tags, are regarded as the de facto industry standard. Supply chain participants install information service systems and provide logistics information to partners by following the EPCglobal architecture framework. Although quality of service (QoS) is essential for providing dependable and scalable services as pointed out by Auto-ID Lab, only a few models for the performance analysis of QoS-related work have been developed in the context of EPC information service systems. Specifically, doing so allows alternative design choices to be tested in an easy and cost-effective manner and can highlight potential performance problems in designs long before any construction costs are incurred. Thus, in this study we construct a model of an EPC information service system for the purposes of performance analysis and designing a dependable system. We also develop a set of building blocks for analytical performance models. To illustrate how the model works, we determine the characteristics of an EPC information service system and then select a combination of these proven modeling concepts. We construct a performance model that considers the response time and shows how to derive meaningful performance values. Finally, we compare the analytical results to measurements of the EPC information service system.

Performance Analysis of Cooperative Communication with Spread Spectrum to Overcome Channel Blockage for On-The-Move Terminal in Next Generation Satellite Communication Systems (차기 군 위성통신체계 환경에서 이동형 위성단말의 채널 blockage 극복을 위한 확산기반 협업통신 기법의 성능 분석)

  • Park, Hyung-Won;Lee, Ho-Sub;Yoon, Won-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.9
    • /
    • pp.757-766
    • /
    • 2014
  • To compensate signal loss due to the channel blockage in satellite communication link, we propose a cooperative communication scheme for OTM(On-The-Move) terminal in next generation satellite communication systems. The proposed scheme configures cooperation subnet with adjacent OTM terminal with the help of ground communication equipment. Shared data is spread by orthogonal spreading code, then the spread sequences are transmitted simultaneously. The receiver combines the power of received signals by EGC(Equal gain combining). The OTM terminal blockage channel is modeled by 2-state Markov chain. We evaluate the bit error rate according to the blockage channel of the channel state for the performance analysis of the proposed scheme. As a result, the proposed scheme shows better BER performance than traditional scheme with the help of subset members. In particular, the proposed scheme shows superior performance as the channel block probability is higher. However, as the number of subset members is increasing, there is a constraint because of the higher multiple access interference.

Mathematical Analysis Power Spectrum of M-ary MSK and Detection with Optimum Maximum Likelihood

  • Niu, Zheng;Jiang, Yuzhong;Jia, Shuyang;Huang, Zhi;Zou, Wenliang;Liu, Gang;Li, Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2900-2922
    • /
    • 2021
  • In this paper, the power spectral density(PSD) for Multilevel Minimum Shift Keyed signal with modulation index h = 1/2 (M-ary MSK) are derived using the mathematical method of the Markov Chain model. At first, according to an essential requirement of the phase continuity characteristics of MSK signals, a complete model of the whole process of signal generation is built. Then, the derivations for autocorrelation functions are carried out precisely. After that, we verified the correctness and accuracy of the theoretical derivation by comparing the derived results with numerical simulations using MATLAB. We also divided the spectrum into four components according to the derivation. By analyzing these figures in the graphic, each component determines the characteristics of the spectrum. It is vital for enhanced spectral characteristics. To more visually represent the energy concentration of the main flap and the roll-down speed of the side flap, the specific out-of-band power of M-ary MSK is given. OMLCD(Optimum Maximum Likelihood Coherent Detection) of M-ary MSK is adopted to compare the signal received with prepared in advance in a code element T to go for the best. And M-ary MSK BER(Bit Error Rate) is compared with the same ary PSK (Phase Shift Keying) with M=2,4,6,8. The results show the detection method could improve performance by increasing the length of L(memory inherent) in the phase continuity.

A Study on Application of Record Management System Block Chain Technology (기록관리시스템 블록체인 기술 적용 방안 연구)

  • Lee, Gi-yeong;Kim, Ik-han
    • The Korean Journal of Archival Studies
    • /
    • no.60
    • /
    • pp.317-358
    • /
    • 2019
  • Blockchain technology has emerged as one of the key technologies of the fourth industrial revolution. Blockchain technology is characterized by being able to verify the authenticity of stored information in a block and whether it is false or falsified, cannot arbitrarily manipulate or delete a particular record, and is capable of transparent audit trail. This study is designed to explore how to apply blockchain technology to record management. For this purpose, we want to approach the code area, the physical area of the blockchain technology, to explore some of the key physical structures, and to derive the applicability of the blockchain technology. By implementing the part of 'Cloud-Record Management System', future record management system model and currently in the process of phasing out step by step, as a modular block chain, I suggest a blockchain network model that can simplify or replace various functions of the current record management process.

Vocabulary Definition for Describing Business Process Events of International Logistics on EPCIS (EPCIS 국제물류 비즈니스 프로세스 이벤트 기술을 위한 어휘 정의)

  • Lee, Sun-Young;Bae, Woo-Sik;Lee, Jong-Yun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.334-344
    • /
    • 2009
  • The EPCglobal Network is a system which provides the information of items to suppliers, consumers, and customers by granting identification numbers on the goods based on the technologies of EPC(Electronic Product Code) and RFID(Radio Frequency Identification), and connecting the space to store those information by network. The EPCglobal architecture framework is also a service consolidating supply and process chain by using EPC for the common goal of business corporations. In the national level, it is necessary to define standard vocabularies for each location and logistics business process for RFID environment using the pre-constructed logistics information infrastructure. Therefore, we define the standard vocabularies and partially user vocabularies for international logistics on EPCglobal network architecture. Finally, we believe that our vocabularies contribute to describing the events fur the EPCglobal network architecture and actually providing usable platform via the XML implementation.

PNC(Pipeline Network Coding)-Based Message and Node Authentication in Wireless Networks (무선 네트워크에서 파이프라인 네트워크 코딩 기반 메시지 및 노드 인증)

  • Ahn, Myeong-Gi;Cho, Young-Jong;Kang, Kyungran
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.999-1008
    • /
    • 2017
  • In this paper, we propose a pipeline network coding (PNC) scheme for efficient data transmission in wireless networks, a data authentication scheme for verifying the integrity of data, and a node authentication scheme for a virtual source. PNC is a technique that improves the overall network performance by relaying data such that the relay node performing network coding transmits to the sender instead. However, network coding is vulnerable to a pollution attack, which is an attack by a malicious attacker to inject modified data into the network. To prevent this, hash-based message authentication code (HMAC) is used. For this purpose, in order to generate a tag used for data authentication, a key must be distributed to the nodes performing authentication. We applied a hash chain to minimize the overhead of key distribution. A null vector is used as the authentication scheme for the virtual source. Finally, we analyze the safety and complexity of the proposed scheme and show he performance through simulation.

Relative Importance Analysis on Technology Adoption Factors of RFID in SCM (SCM에서 무선인식 기술 수용 요인 별 상대적 중요도 분석)

  • Kim, Tae-Young;Choi, Jun-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.6
    • /
    • pp.185-194
    • /
    • 2007
  • Today, there is in the world-wide cognition about RFID technology due to established standard, EPC(Electronic Product Code). RFID technology will have wide influence over various fields. Especially, RFID technology's advantages will have positive influence on logistics field. We can solve limited various problems presented in SCM by applying RFIB technology. We can have higher cantrol system, better benefits and actual decision information. Many organizations, however, still have hesitated now because RFID technology has not been validated and RFID technology is in early stage. Other problems are employee resistance against new technology and lack of academic empirical research on assimilation RFID technology for organization. Above reasons I mentioned make me study on analysis on assimilation RFID technology decision in SCM field. This study attempts to analyze the assimilation RFID technology factor from previous researches by using AHP. This outcomes of study will be helpful when we assimilate RFID technology in SCM fields.