• Title/Summary/Keyword: security technology

Search Result 6,816, Processing Time 0.033 seconds

Military Competition and Arms Control in Space (우주상 군비경쟁과 군비통제)

  • Shin, Dong-Chun;Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.2
    • /
    • pp.203-237
    • /
    • 2011
  • Since USSR successfully launched its satellite "Sputnik"in 1957, many countries including US and USSR began military use of space, and engaged in arms race in space, which is against spirit and ideals of peaceful use of space as common heritage of mankind stipulated in many treaties such as Outer Space Treaty. With worsening Cold War between East and Western Bloc, this military use of space and arms race in space has been intensifying. Regarding the ideals of peaceful use of space, it is interpreted that military use of space is possible unless it does not have the purpose of aggression. The military use of space may have diverse forms such as attacking satellites in space, or attacking from satellites, making use of present and future technologies available which should include the use of nuclear and kinetic/hyper-speed weapons, laser, particle beams, near explosion, disturbance weapons in different directions (i.e., surface to space, space to space, and space to surface). Arms control is being implemented by the efforts of many countries in different formalities including legislature of international treaties under the auspices of UNCOPUOS and prohibition of weapons of mass destruction. Taking outstanding examples aiming at arms control by international community, there are confidence building measures (CBM), strengthening implementation of existing treaties, partial ban of nuclear tests, countryand regional approach, comprehensive approach and measures having legally binding force. While U.S. has surpassed other countries concerned in the area of military useof space, it withdrew from OST in early 2000s, thereby raising concern of international community. It requires concerted efforts of cooperationand implementation by international society to make sure peace of mankind and environmental conservation through arms control in space. Observing de facto possession of nuclear weapons by North Korea following series of nuclear tests and launching satellites, and efforts of launching rockets by South Korea, it is strongly needed for both countries to take part in arms control efforts by international community.

  • PDF

Space Development and Law in Asia (아시아의 우주개발과 우주법)

  • Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.28 no.2
    • /
    • pp.349-384
    • /
    • 2013
  • The Sputnik 1 launching in 1957 made the world recognize the necessity of international regulations on space development and activities in outer space. The United Nations established COPUOS the very next year, and adopted the mandate to examine legal issues concerning the peaceful uses of outer space. At the time, the military sector of the U.S.A. and the Soviet Union were in charge of the space development and they were not welcomed to discuss the prohibition of the military uses of outer space at the legal section in the COPUOS. Although both countries had common interests in securing the freedom of military uses in outer space. As the social and economic benefits derived from space activities have become more apparent, civil expenditures on space activities have continued to increase in several countries. Virtually all new spacefaring states explicitly place a priority on space-based applications to support social and economic development. Such space applications as satellite navigation and Earth imaging are core elements of almost every existing civil space program. Likewise, Moon exploration continues to be a priority for such established spacefaring states as China, Russia, India, and Japan. Recently, Companies that manufacture satellites and ground equipment have also seen significant growth. On 25 February 2012 China successfully launched the eleventh satellite for its indigenous global navigation and positioning satellite system, Beidou. Civil space activities began to grow in China when they were allocated to the China Great Wall Industry Corporation in 1986. China Aerospace Corporation was established in 1993, followed by the development of the China National Space Administration. In Japan civil space was initially coordinated by the National Space Activities Council formed in 1960. Most of the work was performed by the Institute of Space and Aeronautical Science of the University of Tokyo, the National Aerospace Laboratory, and, most importantly, the National Space Development Agency. In 2003 all this work was assumed by the Japanese Aerospace Exploration Agency(JAXA). Japan eases restrictions on military space development. On 20 June 2012 Japan passed the Partial Revision of the Cabinet Establishment Act, which restructured the authority to regulate Japanese space policy and budget, including the governance of the JAXA. Under this legislation, the Space Activities Commission of the Ministry of Education, Culture, Sports, Science, and Technology, which was responsible for the development of Japanese space program, will be abolished. Regulation of space policy and budget will be handed over to the Space Strategy Headquarter formed under the Prime Minister's Cabinet. Space Strategy will be supported by a Consultative Policy Commission as an academics and independent observers. By revoking Article 4 (Objectives of the Agency) of a law that previously governed JAXA and mandated the development of space programs for "peaceful purposes only," the new legislation demonstrates consistency with Article 2 of the 2008 Basic Space Law. In conformity with the principles laid down in the 1967 Outer Space Treaty JAXA is now free to pursue the non-aggressive military use of space. New legislation is the culmination of a decade-long process that sought ways to "leverage Japan's space development programs and technologies for security purposes, to bolster the nation's defenses in the face of increased tensions in East Asia." In this connection it would also be very important and necessary to create an Asian Space Agency(ASA) for strengthening cooperation within the Asian space community towards joint undertakings.

  • PDF

Multi-Category Sentiment Analysis for Social Opinion Related to Artificial Intelligence on Social Media (소셜 미디어 상에서의 인공지능 관련 사회적 여론에 대한 다 범주 감성 분석)

  • Lee, Sang Won;Choi, Chang Wook;Kim, Dong Sung;Yeo, Woon Young;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.51-66
    • /
    • 2018
  • As AI (Artificial Intelligence) technologies have been swiftly evolved, a lot of products and services are under development in various fields for better users' experience. On this technology advance, negative effects of AI technologies also have been discussed actively while there exists positive expectation on them at the same time. For instance, many social issues such as trolley dilemma and system security issues are being debated, whereas autonomous vehicles based on artificial intelligence have had attention in terms of stability increase. Therefore, it needs to check and analyse major social issues on artificial intelligence for their development and societal acceptance. In this paper, multi-categorical sentiment analysis is conducted over online public opinion on artificial intelligence after identifying the trending topics related to artificial intelligence for two years from January 2016 to December 2017, which include the event, match between Lee Sedol and AlphaGo. Using the largest web portal in South Korea, online news, news headlines and news comments were crawled. Considering the importance of trending topics, online public opinion was analysed into seven multiple sentimental categories comprised of anger, dislike, fear, happiness, neutrality, sadness, and surprise by topics, not only two simple positive or negative sentiment. As a result, it was found that the top sentiment is "happiness" in most events and yet sentiments on each keyword are different. In addition, when the research period was divided into four periods, the first half of 2016, the second half of the year, the first half of 2017, and the second half of the year, it is confirmed that the sentiment of 'anger' decreases as goes by time. Based on the results of this analysis, it is possible to grasp various topics and trends currently discussed on artificial intelligence, and it can be used to prepare countermeasures. We hope that we can improve to measure public opinion more precisely in the future by integrating empathy level of news comments.

Gene Expression of Detoxification Enzymes in Tenebrio molitor after Fungicide Captan Exposure (살진균제인 캡탄 처리 후 갈색거저리의 해독효소 유전자 발현)

  • Jang, Ho am;Baek, Hyoung-Seon;Kim, Bo Bae;Kojour, Maryam Ali Mohammadie;Patnaik, Bharat Bhusan;Jo, Yong Hun;Han, Yeon Soo
    • Korean journal of applied entomology
    • /
    • v.61 no.1
    • /
    • pp.155-163
    • /
    • 2022
  • The application of fungicides is indispensable to global food security, and their use has increased in recent times. Fungicides, directly or indirectly, have impacted insects, leading to genetic and molecular-level changes. Various detoxification mechanisms allow insects to eliminate reactive oxygen species (ROS) toxicity induced by agrochemicals including fungicides. In the present study, we analyzed the mRNA expression levels of detoxifying enzymes in Tenebrio molitor larvae following exposure to non-lethal doses (0.2, 2, and 20 ㎍/µL) of a fungicide captan. Transcripts of peroxidases (POXs), catalases (CATs), superoxide dismutases (SODs), and glutathione-s-transferases (GSTs) were screened from the T. molitor transcriptome database. RT-qPCR analysis showed that TmPOX5 mRNA increased significantly 24 h post-captan exposure. A similar increase was noticed for TmSOD4 mRNA 3 h post-captan exposure. Moreover, the expression of TmCAT2 mRNA increased significantly 24 h post-treatment with 2 ㎍/µL captan. TmGST1 and TmGST3 mRNA expression also increased noticeably after captan exposure. Taken together, these results suggest that TmPOX5 and TmSOD4 mRNA can be used as biomarkers or xenobiotics sensors for captan exposure in T. molitor, while other detoxifying enzymes showed differential expression.

A Study on the Utilization of Naval Personnel According to Characteristics of New Generations: Discussion from the Perspective of Generation Z, a Newly Emerging Generation (신세대의 특성에 따른 해군 인력 활용의 과제 - 또 다른 신세대, Z세대 관점에서의 고찰)

  • Min, Seung-Un;Kim, Seong-Yeol
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.57-82
    • /
    • 2022
  • The objective of this treatise is to explore the limitations of the current navy manpower utilization system and the ways to improve it from the perspective of Generation Z. As Generation Z, following Millennials, has finally come of age, this new group is constituting a gradually greater proportion of military personnel. Due to the typical characteristics of naval operations, the harmony between Millennials and Generation Z, which is differentiated from Generation X in view of dispositions and traits, is one of the essential issues to be discussed. Generally, in a naval vessel, there are numerous pieces of equipment necessary to carry out a wide range of missions and a large number of crew members who operate them with consistent levels of fighting power. This is all while members are living together within the narrow space throughout the 24 hours of each day. Under such particular circumstances, any inter-generational conflicts may have a disruptive effect on the successful accomplishment of naval missions. Currently, new generations of military personnel are facing social difficulties in different aspects compared with the previous generations, and also have different viewpoints on the military. In this regard, in order to foster true harmony between generations, it is considered necessary to take a closer look at the inter-generational differences from their respective standpoints and to examine whether the military organization has taken adequate steps to respond to such changes. Accordingly, Chapters 1 and 2 cover the environments in which Millennials and Generation Z were raised during their childhood to young adulthood, which are distinct from those of older generations, their viewpoints formed based on such backgrounds, and the need to resolve various conflicts between generations. In Chapter 3, the current actions taken by overseas military powers to enhance the coexistence with Generation MZ are analyzed to find the significant implications they had. Chapter 4 examines the operation environments specific to the navy; identifies the potential barriers to achieving harmony between generations by assessing the current status of personnel utilization in the Korean navy in terms of the seaman, petty officer, and the officer, as well as policy; and outlines the solutions to drive harmony. Finally, Chapter 5 emphasizes the need to establish a genuine empathy between generations based on the understanding of unique inter-generational characteristics. This section also discusses the importance of addressing difficulties in utilizing technology-centered naval manpower, and forecasts a scenario of a naval organization that resolves the problem of utilizing naval personnel and the inter-generational conflicts in the future.

  • PDF

Samae Dam chicken: a variety of the Pradu Hang Dam breed revealed from microsatellite genotyping data

  • Nivit Tanglertpaibul;Trifan Budi;Chien Phuoc Tran Nguyen;Worapong Singchat;Wongsathit Wongloet;Nichakorn Kumnan;Piangjai Chalermwong;Anh Huynh Luu;Kantika Noito;Thitipong Panthum;Pish Wattanadilokchatkun;Anuphong Payopat;Natthamon Klinpetch;Aingorn Chaiyes;Kanithaporn Vangnai;Chotika Yokthongwattana;Chomdao Sinthuvanich;Syed Farhan Ahmad;Narongrit Muangmai;Kyudong Han;Mitsuo Nunome;Akihiko Koga;Prateep Duengkae;Sompon Waipanya;Yoichi Matsuda;Kornsorn Srikulnath
    • Animal Bioscience
    • /
    • v.37 no.12
    • /
    • pp.2033-2043
    • /
    • 2024
  • Objective: The remarkable adaptability to the environment, high growth rate, meat with good taste and aroma, and ornamental appearance of the Pradu Hang Dam (PDH) and Samae Dam (SD) chickens make them valuable for improvement of poultry production to enhance food security. However, despite their close phenotypic similarity, distinct classification of PDH and SD chickens remains controversial. Thus, this study aimed to clarify genetic origins and variation between PDH and SD chickens, genetic diversity and structures of PDH and SD chickens. Methods: This study analyzed 5 populations of PDH and 2 populations of SD chickens using 28 microsatellite markers and compared with those of other indigenous and local chicken breeds using Thailand's "The Siam Chicken Bioresource Project" database. Results: Considerably high genetic variability was observed within PDH (370 total alleles; 4.086±0.312 alleles/locus) and SD chickens (179 total alleles; 3.607±0.349 alleles/locus). A partial overlap of gene pools was observed between SD chickens from the Department of Livestock, Uthai Thani (SD1) and PDH chickens, suggesting a potentially close relationship between the two chicken breeds. A gene pool that partially overlapped with that of the red junglefowl was observed in the SD chicken population from the Sanhawat Farm Uthai Thani population (SD2). Distinct subclusters were observed within SD chickens, indicating the possibility that genetic differentiation occurred early in the process of establishment of SD chickens. Conclusion: These findings could offer valuable insights into genetic verification of Thai local chicken breeds and their sustainable conservation and utilization.

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.

The Status of North Korean Airspace after Reunification (북한 공역의 통일 후 지위)

  • Kwon, Chang-Young
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.287-325
    • /
    • 2017
  • Considering the development of aerospace, military science and technology since the 20th century, the sky is very important for the nation's existence and prosperity. The proverb "Whosoever commands the space commands the world itself!" emphasizes the need for the command of the air. This essay is the first study on the status of airspace after reunification. First, the territorial airspace is over the territory and territorial sea, and its horizontal extent is determined by the territorial boundary lines. Acceptance of the present order is most reasonable, rather than attempting to reconfigure through historical truths about border issues, and it could be supported by neighboring countries in the reunification period. For peace in Northeast Asia, the reunified Korea needs to respect the existing border agreement between North Korea and China or Russia. However, the North Korean straight baselines established in the East Sea and the Yellow Sea should be discarded because they are not available under United Nations Convention on the Law of the Sea. It is desirable for the reunified Korea to redefine the straight baselines that comply with international law and determine the territorial waters up to and including the 12-nautical mile outside it. Second, the Flight Information Region (hereinafter "FIR") is a region defined by the International Civil Aviation Organization (hereinafter "ICAO") in order to provide information necessary for the safe and efficient flight of aircraft and the search and rescue of aircraft. At present, Korea is divided into Incheon FIR which is under the jurisdiction of South Korea and Pyongyang FIR which is under the jurisdiction of North Korea. If North Korea can not temporarily exercise control of Pyongyang FIR due to a sudden change of circumstances, it is desirable for South Korea to exercise control of Pyongyang FIR, and if it is unavoidable, ICAO should temporarily exercise it. In reunified Korea, it is desirable to abolish Pyongyang FIR and integrate it into Incheon FIR with the approval of ICAO, considering systematic management and control of FIR, establishment of route, and efficiency of management. Third, the Air Defense Identification Zone (hereinafter "ADIZ") is a zone that requires easy identification, positioning, and control of aircraft for national security purposes, and is set up unilaterally by the country concerned. The US unilaterally established the Korea Air Defense Identification Area (KADIZ) by the Declaration of Commitment on March 22, 1951. The Ministry of Defense proclaimed a new KADIZ which extended to the area including IEODO on December 13, 2013. At present, North Korea's military warning zone is set only at maritime boundaries such as the East Sea and the Yellow Sea. But in view of its lack of function as ADIZ in relations with China and Russia, the reunified Korea has no obligation to succeed it. Since the depth of the Korean peninsula is short, it is necessary to set ADIZ boundary on the outskirts of the territorial airspace to achieve the original purpose of ADIZ. Therefore, KADIZ of the reunified Korea should be newly established by the boundary line that coincides with the Incheon FIR of the reunified Korea. However, if there is no buffer zone overlapping with or adjacent to the ADIZs of neighboring countries, military tensions may rise. Therefore, through bilateral negotiations for peace in Northeast Asia, a buffer zone is established between adjacent ADIZs.

  • PDF

An Analysis of the Moderating Effects of User Ability on the Acceptance of an Internet Shopping Mall (인터넷 쇼핑몰 수용에 있어 사용자 능력의 조절효과 분석)

  • Suh, Kun-Soo
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.27-55
    • /
    • 2008
  • Due to the increasing and intensifying competition in the Internet shopping market, it has been recognized as very important to develop an effective policy and strategy for acquiring loyal customers. For this reason, web site designers need to know if a new Internet shopping mall(ISM) will be accepted. Researchers have been working on identifying factors for explaining and predicting user acceptance of an ISM. Some studies, however, revealed inconsistent findings on the antecedents of user acceptance of a website. Lack of consideration for individual differences in user ability is believed to be one of the key reasons for the mixed findings. The elaboration likelihood model (ELM) and several studies have suggested that individual differences in ability plays an moderating role on the relationship between the antecedents and user acceptance. Despite the critical role of user ability, little research has examined the role of user ability in the Internet shopping mall context. The purpose of this study is to develop a user acceptance model that consider the moderating role of user ability in the context of Internet shopping. This study was initiated to see the ability of the technology acceptance model(TAM) to explain the acceptance of a specific ISM. According to TAM. which is one of the most influential models for explaining user acceptance of IT, an intention to use IT is determined by usefulness and ease of use. Given that interaction between user and website takes place through web interface, the decisions to accept and continue using an ISM depend on these beliefs. However, TAM neglects to consider the fact that many users would not stick to an ISM until they trust it although they may think it useful and easy to use. The importance of trust for user acceptance of ISM has been raised by the relational views. The relational view emphasizes the trust-building process between the user and ISM, and user's trust on the website is a major determinant of user acceptance. The proposed model extends and integrates the TAM and relational views on user acceptance of ISM by incorporating usefulness, ease of use, and trust. User acceptance is defined as a user's intention to reuse a specific ISM. And user ability is introduced into the model as moderating variable. Here, the user ability is defined as a degree of experiences, knowledge and skills regarding Internet shopping sites. The research model proposes that the ease of use, usefulness and trust of ISM are key determinants of user acceptance. In addition, this paper hypothesizes that the effects of the antecedents(i.e., ease of use, usefulness, and trust) on user acceptance may differ among users. In particular, this paper proposes a moderating effect of a user's ability on the relationship between antecedents with user's intention to reuse. The research model with eleven hypotheses was derived and tested through a survey that involved 470 university students. For each research variable, this paper used measurement items recognized for reliability and widely used in previous research. We slightly modified some items proper to the research context. The reliability and validity of the research variables were tested using the Crobnach's alpha and internal consistency reliability (ICR) values, standard factor loadings of the confirmative factor analysis, and average variance extracted (AVE) values. A LISREL method was used to test the suitability of the research model and its relating six hypotheses. Key findings of the results are summarized in the following. First, TAM's two constructs, ease of use and usefulness directly affect user acceptance. In addition, ease of use indirectly influences user acceptance by affecting trust. This implies that users tend to trust a shopping site and visit repeatedly when they perceive a specific ISM easy to use. Accordingly, designing a shopping site that allows users to navigate with heuristic and minimal clicks for finding information and products within the site is important for improving the site's trust and acceptance. Usefulness, however, was not found to influence trust. Second, among the three belief constructs(ease of use, usefulness, and trust), trust was empirically supported as the most important determinants of user acceptance. This implies that users require trustworthiness from an Internet shopping site to be repeat visitors of an ISM. Providing a sense of safety and eliminating the anxiety of online shoppers in relation to privacy, security, delivery, and product returns are critically important conditions for acquiring repeat visitors. Hence, in addition to usefulness and ease of use as in TAM, trust should be a fundamental determinants of user acceptance in the context of internet shopping. Third, the user's ability on using an Internet shopping site played a moderating role. For users with low ability, ease of use was found to be a more important factors in deciding to reuse the shopping mall, whereas usefulness and trust had more effects on users with high ability. Applying the EML theory to these findings, we can suggest that experienced and knowledgeable ISM users tend to elaborate on such usefulness aspects as efficient and effective shopping performance and trust factors as ability, benevolence, integrity, and predictability of a shopping site before they become repeat visitors of the site. In contrast, novice users tend to rely on the low elaborating features, such as the perceived ease of use. The existence of moderating effects suggests the fact that different individuals evaluate an ISM from different perspectives. The expert users are more interested in the outcome of the visit(usefulness) and trustworthiness(trust) than those novice visitors. The latter evaluate the ISM in a more superficial manner focusing on the novelty of the site and on other instrumental beliefs(ease of use). This is consistent with the insights proposed by the Heuristic-Systematic model. According to the Heuristic-Systematic model. a users act on the principle of minimum effort. Thus, the user considers an ISM heuristically, focusing on those aspects that are easy to process and evaluate(ease of use). When the user has sufficient experience and skills, the user will change to systematic processing, where they will evaluate more complex aspects of the site(its usefulness and trustworthiness). This implies that an ISM has to provide a minimum level of ease of use to make it possible for a user to evaluate its usefulness and trustworthiness. Ease of use is a necessary but not sufficient condition for the acceptance and use of an ISM. Overall, the empirical results generally support the proposed model and identify the moderating effect of the effects of user ability. More detailed interpretations and implications of the findings are discussed. The limitations of this study are also discussed to provide directions for future research.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.