• Title/Summary/Keyword: reader

Search Result 1,480, Processing Time 0.028 seconds

A Study on Differentiation Strategy for Tablet PC and e-Book Reader by a Comparative Analysis of Acceptance.Diffusion Factors (태블릿PC와 전자책단말기의 수용.확산 요인 비교분석을 통한 차별화 전략 연구)

  • Sim, Jin-Bo
    • Korean Management Science Review
    • /
    • v.28 no.1
    • /
    • pp.25-42
    • /
    • 2011
  • The mobile industry is the key foundation of digital convergence, and its constant growth is expected. Among mobile industries, new products leading the development of devices are the Emerging Device. This study is conducted to find out factors making differentiated by comparing the structural equation model(SEM) of the Tablet PC and the e-Book Reader. The main findings are as follows. First, the application of TAM to the Emerging Device shows that fitness of the model is generally high but the effect of Perceived Ease of Use has not been verified or found insignificant. Second, the acceptance model of the Tablet PC and the e-Book Reader has found that playfulness stimulates acceptance intentions. Third, the cost level of the Emerging Device acceptance model is not a factor stimulating consumers' acceptance intentions. Fourth, product attributes of the Tablet PC and the e-Book Reader to differentiate themselves from the other device are Functionality and Playfulness respectively.

A Study on the Data Anti-collision using Time-domain Procedure on RFID(Radio Frequency Identification) System (무선인식 시스템에서 시간절차를 이용한 데이터 충돌 방지에 관한 연구)

  • 강민수;신석균;이준호;이동선;유광균;박영수;이기서
    • Journal of the Korean Society for Railway
    • /
    • v.4 no.4
    • /
    • pp.155-161
    • /
    • 2001
  • In this paper, the method is suggested to prevent data collision or damage on RFID(Radio Frequency Identification) system, in case a reader reading multi-tag simultaneously, using binary-search algorithm and Time-domain anti-collision procedure at reader and tag, respectively. The RFID system is designed that Reader enable to communicate with Tag on 13.56MHz bandwidth which is ISM(Industrial Science Medical) bandwidth, antennas of Tag part are designed using MCRF335 Chip. When RF communication is achieved between reader and tag, in case that data is transmitted to reader pass through multiple tags simultaneously, a study on the anti-collision method for the situation that the data collision occurs is performed.

  • PDF

Design of Security Protocol for RFID System using Mobile Reader (이동형 리더를 사용하는 RFID시스템의 보안 프로토콜 설계)

  • Jang, Bong-Im;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.954-955
    • /
    • 2012
  • Recently as increasing the use of mobile communication devices the use of mobile readers for recognition tag attached to objects is also increasing. Accordingly, meantime, that gives rise to the vulnerability of RFID systems between reader and tag security issues, as well as security issues between the reader and the back-end server will occur. In this paper between the reader and the back-end server to security vulnerabilities efficient authentication protocol using the hash function is proposed.

  • PDF

Implementation of physical distributing administration using Multi-UHF band RFID Reader (UHF 대역 멀티밴드 RFID Reader를 이용한 물류 관리 시스템 구현)

  • Park Kyung-Hwan;Kim Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.970-973
    • /
    • 2006
  • In this paper, this system implements a wireless parking lots management using RFID. Universal RFID Reader uses the software and specifies the class of UHF band. And then, it can recognize UHF band tags controlling the hardware. It can provide more efficient administration of physical distribution.

  • PDF

Tag Identification Scheme based on Multi-Reader for Reducing Tag Authentication Time (태그 인증 시간 단축을 위한 다중 리더 기반의 태그 인식 기법)

  • Jang, Bong-Im;Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.13-19
    • /
    • 2012
  • The use of RFID is recently increasing for the realization of Ubiquitous computing. Reducing the process time of tag recognition is crucial as RFID system has to recognize multiple objects in a short amount of time. In this manuscript, therefore, an effective scheme using multi-reader is suggested to improve processing speed for tag authentication in RFID system. According to the result of performance analysis, the processing time required for tag authentication was drastically reduced in multi-reader environment than it was in a single reader. Consequently, the use of the suggested scheme cuts down on the processing time while identifying tags by using multi-reader and bring about overall performnce improvement of RFID system.

An Enhanced Mutual Key Agreement Protocol for Mobile RFID-enabled Devices

  • Mtoga, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.1
    • /
    • pp.65-71
    • /
    • 2012
  • Mobile RFID is a new application that uses a mobile phone as an RFID reader with wireless technology and provides a new valuable service to users by integrating RFID and ubiquitous sensor network infrastructures with mobile communication and wireless Internet. Whereas the mobile RFID system has many advantages, privacy violation problems on the reader side are very concerning to individuals and researchers. Unlike in regular RFID environments, where the communication channel between the server and reader is assumed to be secure, the communication channel between the backend server and the RFID reader in the mobile RFID system is not assumed to be safe. Therefore it has become necessary to devise a new communication protocol that secures the privacy of mobile RFID-enabled devices. Recently, Lo et al. proposed a mutual key agreement protocol that secures the authenticity and privacy of engaged mobile RFID readers by constructing a secure session key between the reader and server. However, this paper shows that this protocol does not meet all of the necessary security requirements. Therefore we developed an enhanced mutual key agreement protocol for mobile RFID-enabled devices that alleviates these concerns. We further show that our protocol can enhance data security and provide privacy protection for the reader in an unsecured mobile RFID environment, even in the presence of an active adversary.

  • PDF

Age and growth of the flathead grey mullet (Mugil cephalus) in the coastal water of Yeosu (여수 연안 숭어 (Mugil cephalus)의 연령과 성장 연구)

  • Zhang, Chang-Ik;Park, Hee-Won;Kwon, Hyeok-Chan
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.47 no.3
    • /
    • pp.203-213
    • /
    • 2011
  • The age and growth of flathead grey mullet, Mugil cephalus, were studied using samples collected from the coastal water of Yeosu from September 2009 to August 2010. Spawning season estimated from the gonadosometic index (GSI) was from November to January. A method for increasing the readability of the otolith was described and criteria for the interpretation of otolith was provided. The annual ring was formed in September once a year. Annual ring in otolith for flathead grey mullet is validated for fish aged 1-8 using the marginal increment analysis. Using the sectioned otolith, between reader precision was 84%. Also, Within-reader agreement for sectioned otolith age readings was higher (reader 1=84%, reader 2=87%). The relationship between fork length and total weight was TW=$0.022FL^{2.818}$. The estimated von Bertalanffy growth parameters for the flathead grey mullet were $L_{\infty}$=67.97cm K=0.164/year and $t_o$=-0.81year.

A Study of Relationship between the Reading Activities and the Reading Camp Program (독서캠프 프로그램을 통한 독서활동 전개에 관한 연구 - 독서지도자와 집단지도 대상자와의 상호 독서활동을 중심으로 -)

  • 김승환
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.2
    • /
    • pp.239-267
    • /
    • 2001
  • The reading camp program for mutual reading activities between reader`s advisers and readers which has been played four times in 2000 shows the reaction to reading activities among them as follows. $\circled1$ All of reader`s advisers and readers took an active part in the reading camp program and reader's advisers were more active. $\circled2$ All of participants of the reading camp was satisfied by all of the reading program and especially leaders were affected by daily life of reader`s advisers. $\circled3$ All of participants had an opportunity of reflections on his reading activities and leader`s advisers established their sense of life and sense of values in more affirmative. The reading camp program helped participant to enhance his reading life very much and yet reader`s advisers acquired something more than readers did especially.

  • PDF

Hawthorne's control of the reader represented in his prefaces (호손의 독자 조종: '머리말'을 중심으로)

  • Kim, Ji-Won
    • English Language & Literature Teaching
    • /
    • v.16 no.4
    • /
    • pp.185-200
    • /
    • 2010
  • Nathaniel Hawthorne seems to realize the reader's role in bringing his creation of fiction to completion. Almost all of Hawthorne's prefaces may be considered in terms of their contribution to the writer's narrative strategy. When he refers to the audience in the prefatory essay, "The Custom-House" and other prefaces to his major works as "the Reader," Hawthorne is establishing a mutual complicity that will continue throughout the following narratives. According to this rhetorical alliance, the writer's obligation is to get the story into the reader's imagination by any means possible, while the reader's share is to believe the story as much as possible while it is being told. The ultimate issue is thus not whether any event actually happened as Hawthorne reports it but whether readers are willing to grant the event credence while they are reading. Hawthorne's relationship with his audience is not congenial. In his prefaces, Hawthorne sometimes reveals a narrator who evades a fixed identity. The introduction of an unreliable narrator helps illuminate the unresolved, elusive ambiguity in Hawthorne's stories. Hawthorne seeks to make his narrative ambiguous frequently utilizing the very same indeterminacy so often cherished by poststructuralists. No critical term may be more firmly associated with the works of Hawthorne than ambiguity. Looking for new readers with more fresh eyes, Hawthorne's narratives always remain open to reinterpretation. After all, Hawthorne's prefaces (sometimes including unreliable narrators) help him become one of the most frustrating and fascinating novelists.

  • PDF

A Study on Optimal Searching Path Using Handheld RFID Reader and Deployment of a Stationary Reader to Maximize the Efficiency of the Search Process for Missing Medical Assets (휴대용 RFID 리더기를 활용한 분실 의료자산 최적 검색 경로 결정과 천정 고정식 리더기 설치위치 선정 방안 연구)

  • Kim, Gak-Gyu;Cho, Sung-Jin;Yun, Bong-Kyu
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.4
    • /
    • pp.95-109
    • /
    • 2012
  • Being able to quickly locate valuable medical equipment is critical inside hospitals. In order to utilize limited budget and resources efficiently, accurate locating or tracking is required in many fields. In this research, we focus on how to find the location of missing assets by using RFID in real time indoors to track equipment. When equipment needs to be searched, the purpose of a RFID device is to minimize the time, investment cost and effort spent searching for the equipment. Thus, this research presents a mathematical model of using RFID (both handheld reader and stationary reader) for efficient asset location. We derive the expected time of locating RFID-tagged objects in a multi-area environment where hand-held RF readers are used. We then discuss where to deploy stationary RF readers in order to maximize the efficiency of the search process.