• Title/Summary/Keyword: memory tag

Search Result 77, Processing Time 0.022 seconds

A Study on Performance Enhancement of RFID Anti-Collision Protocols (RFID 충돌방지 프로토콜의 성능 개선에 관한 연구)

  • Kim, Young-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.4
    • /
    • pp.281-285
    • /
    • 2011
  • One of the key issues in implementing RFID systems is to design anti-collision protocols for identifying all the tags in the interrogation zone of a RFID reader with the minimum identification delay. In this paper, Furthermore, in designing such protocols, the limited resources in tags and readers in terms of memory and computing capability should be fully taken into consideration. we first investigate two typical RFID anti-collision algorithms, namely RFID Gen2 Q algorithm (accepted as the worldwide standard in industrial domain) and FAFQ algorithm including their drawbacks and propose a new RFID anti-collision algorithm, which can improve the performance of RFID systems in terms of tag identification time considerably. Further, we compared performance of the proposed algorithm with Q algorithm and FAFQ algorithm through computer simulation.

Developing Program for Processing a Mass DEM Data using Streaming Method (스트리밍 방식을 이용한 대용량 DEM 프로세싱 프로그램의 개발)

  • Lee, Dong-Ha;Lee, Yong-Gyun;Suh, Yong-Cheol
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.4
    • /
    • pp.61-66
    • /
    • 2009
  • This Paper describes a new program called DEM Generator need to process DEM from LiDAR data or digital map data. It is difficult to generate raster DEM from LiDAR mass point data sets and digital maps too large to fit into memory. The DEM Generator was designed to process DEM and shaded relief image of GeoTiff format in order of streaming meshes; I/O minimize tag, delaunay triangle, natural neighborhood or TIN, temporary files and grid. It is expected that we can be improved the precision of DEM and solved the time consuming problem of DEM generating of a wider area.

  • PDF

Streaming RFID: Robust Stream Transmission over Passive RFID

  • Hwang, Seok-Joong;Han, Young-Sun;Kim, Seon-Wook;Kim, Jong-Ok
    • ETRI Journal
    • /
    • v.33 no.3
    • /
    • pp.382-392
    • /
    • 2011
  • This paper proposes the streaming radio frequency identification (RFID) protocol to support robust data streaming in a passive communication, which is extended from the ISO18000-6 Type C RFID standard. By observing and modeling the unique bit error behavior through detailed analysis in this paper, we found that performance is significantly limited by inaccurate and unstable link frequencies as well as low SNR which are inevitable for passive devices. Based on the analysis, we propose a simple and efficient protocol to adaptively insert extra error control sequences in a packet for tolerating tough link condition while maximizing the throughput and preserving the minimal implementation cost. To evaluate effectiveness of our proposal in real-time streaming applications, we experimented on real-time H.264 video streaming and prototyped the system on FPGA. To our best knowledge, our paper is the first work to take analytical approach for maximizing the throughput and demonstrate the possibility of the realtime multimedia streaming transmission in the passive RFID system.

A Transparent Logic Circuit for RFID Tag in a-IGZO TFT Technology

  • Yang, Byung-Do;Oh, Jae-Mun;Kang, Hyeong-Ju;Park, Sang-Hee;Hwang, Chi-Sun;Ryu, Min Ki;Pi, Jae-Eun
    • ETRI Journal
    • /
    • v.35 no.4
    • /
    • pp.610-616
    • /
    • 2013
  • This paper proposes a transparent logic circuit for radio frequency identification (RFID) tags in amorphous indium-gallium-zinc-oxide (a-IGZO) thin-film transistor (TFT) technology. The RFID logic circuit generates 16-bit code programmed in read-only memory. All circuits are implemented in a pseudo-CMOS logic style using transparent a-IGZO TFTs. The transmittance degradation due to the transparent RFID logic chip is 2.5% to 8% in a 300-nm to 800-nm wavelength. The RFID logic chip generates Manchester-encoded 16-bit data with a 3.2-kHz clock frequency and consumes 170 ${\mu}W$ at $V_{DD}=6$ V. It employs 222 transistors and occupies a chip area of 5.85 $mm^2$.

Acoustic Event Detection and Matlab/Simulink Interoperation for Individualized Things-Human Interaction (사물-사람 간 개인화된 상호작용을 위한 음향신호 이벤트 감지 및 Matlab/Simulink 연동환경)

  • Lee, Sanghyun;Kim, Tag Gon;Cho, Jeonghun;Park, Daejin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.4
    • /
    • pp.189-198
    • /
    • 2015
  • Most IoT-related approaches have tried to establish the relation by connecting the network between things. The proposed research will present how the pervasive interaction of eco-system formed by touching the objects between humans and things can be recognized on purpose. By collecting and sharing the detected patterns among all kinds of things, we can construct the environment which enables individualized interactions of different objects. To perform the aforementioned, we are going to utilize technical procedures such as event-driven signal processing, pattern matching for signal recognition, and hardware in the loop simulation. We will also aim to implement the prototype of sensor processor based on Arduino MCU, which can be integrated with system using Arduino-Matlab/Simulink hybrid-interoperation environment. In the experiment, we use piezo transducer to detect the vibration or vibrates the surface using acoustic wave, which has specific frequency spectrum and individualized signal shape in terms of time axis. The signal distortion in time and frequency domain is recorded into memory tracer within sensor processor to extract the meaningful pattern by comparing the stored with lookup table(LUT). In this paper, we will contribute the initial prototypes for the acoustic touch processor by using off-the-shelf MCU and the integrated framework based on Matlab/Simulink model to provide the individualization of the touch-sensing for the user on purpose.

Expansion of Word Representation for Named Entity Recognition Based on Bidirectional LSTM CRFs (Bidirectional LSTM CRF 기반의 개체명 인식을 위한 단어 표상의 확장)

  • Yu, Hongyeon;Ko, Youngjoong
    • Journal of KIISE
    • /
    • v.44 no.3
    • /
    • pp.306-313
    • /
    • 2017
  • Named entity recognition (NER) seeks to locate and classify named entities in text into pre-defined categories such as names of persons, organizations, locations, expressions of times, etc. Recently, many state-of-the-art NER systems have been implemented with bidirectional LSTM CRFs. Deep learning models based on long short-term memory (LSTM) generally depend on word representations as input. In this paper, we propose an approach to expand word representation by using pre-trained word embedding, part of speech (POS) tag embedding, syllable embedding and named entity dictionary feature vectors. Our experiments show that the proposed approach creates useful word representations as an input of bidirectional LSTM CRFs. Our final presentation shows its efficacy to be 8.05%p higher than baseline NERs with only the pre-trained word embedding vector.

Reader Level Filtering for Query Processing in an RFID Middleware (RFID 미들웨어에서 질의 처리를 위한 리더 단계 여과)

  • Kabir, Muhammad Ashad;Ryu, Woo-Seok;Hong, Bong-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.3
    • /
    • pp.113-122
    • /
    • 2008
  • In RFID system, Middleware collects and filters streaming data gathered continuously from readers to process applications requests. The enormous amount of data makes middleware in highly overloaded. Hence, we propose reader level filtering in order to reduce overall middleware load. In this paper, we consider reader filtering capability and define query plan to minimize number of queries for processing into middleware and reader level. We design and implement middleware system based on proposed query plan. We perform several experiments on implemented system. Our experiments show that the proposed query plan considerably improves the performance of middleware by diminishing processing time and network traffic between reader and middleware.

Brain Activation Associated with Set Size During Random Number Generation (무선열 생성과제에서 반응후보 수에 따른 뇌활성화 양상)

  • Lee, Byeong-Taek;Kim, Cheong-Tag
    • Korean Journal of Cognitive Science
    • /
    • v.19 no.1
    • /
    • pp.57-74
    • /
    • 2008
  • This study aimed to investigate the preferential brain activations involed in the set size during random number generation (RNG). The BNG condition gave more increased activations in the anterior cingulate cortex (ACC), inferior frontal gyrus (IFG), inferior parietal lobule (IPL), and superior temporal gyrus (STG) than the simple counting condition, which was a control rendition. When the activations were compared by the small set size condition versus the large set size condition, broad areas covering tempore-occipital network, ACC, and postcentral gyrus were more highly activated in the small set size condition than in the large set size condition, while responses of areas including medial frontal gyrus, superior parietal lobule, and lingual gyrus were more increased in the large set size condition than in the small set size condition. The capacity hypothesis of working memory fails to explain the results. On the contrary, strategy selection hypothesis seems to explain the current observations properly.

  • PDF

An Effective Cache Test Algorithm and BIST Architecture (효율적인 캐쉬 테스트 알고리듬 및 BIST 구조)

  • Kim, Hong-Sik;Yoon, Do-Hyun;Kang, Sing-Ho
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.12
    • /
    • pp.47-58
    • /
    • 1999
  • As the performance of processors improves, cache memories are used to overcome the difference of speed between processors and main memories. Generally cache memories are embedded and small sizes, fault coverage is a more important factor than test time in testing point of view. A new test algorithm and a new BIST architecture are developed to detect various fault models with a relatively small overhead. The new concurrent BIST architecture uses the comparator of cache management blocks as response analyzers for tag memories. A modified scan-chain is used for pre-testing of comparators which can reduce test clock cycles. In addition several boundary scan instructions are provided to control the internal test circuitries. The results show that the new algorithm can detect SAFs, AFs, TFs linked with CFs, CFins, CFids, SCFs, CFdyns and DRFs models with O(12N), where N is the memory size and the new BIST architecture has lower overhead than traditional architecture by about 11%.

  • PDF

Effect of Garbage Collection in the ZG-machine (ZG-machine에서 기억 장소 재활용 체계의 영향)

  • Woo, Gyun;Han, Tai-Sook
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.7
    • /
    • pp.759-768
    • /
    • 2000
  • The ZG-machine is a space-efficient G-machine, which exploits a simple encoding method, called tag-forwarding, to compress the heap structure of graphs. Experiments on the ZG-machine without garbage collection shows that the ZG-machine saves 30% of heap space and the run-time overhead is no more than 6% than the G-machine. This paper presents the results of further experiments on the ZG-machine with the garbage collector. As a result, the heap-residency of the ZG-machine decreases by 34% on average although the run-time increases by 34% compared to the G-machine. The high rate of the run-time overhead of the ZG-machine is incurred by the garbage collector. However, when the heap size is 7 times the heap-residency, the run-time overhead of the ZG-machine is no more than 12% compared to the G-machine. With the aspect of reduced heap-residency, the ZG-machine may be useful in memory-restricted environments such as embedded systems. Also, with the development of a more efficient garbage collector, the run-time is expected to decrease significantly.

  • PDF