• Title/Summary/Keyword: 무선세기

Search Result 266, Processing Time 0.028 seconds

Design of the Satellite Beacon Receiver Using Array Based Digital Filter (다중배열 디지털필터를 이용한 위성비콘 수신기 설계)

  • Lee, Kyung-Soon;Koo, Kyung-Heon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.10
    • /
    • pp.909-916
    • /
    • 2016
  • The beacon receiver is an equipment which detects and measures the signal strength of transmitting satellite beacon signal. Beacon signals transmitted by satellites are low power continuous wave(CW) signals without any modulation intended for antenna steering to satellite direction and power control purposes on the earth. The beacon signal detection method using a very narrow band analog filter and RSSI(Received Signal Strength Intensity) has been typically used. However, it requires the implementation to track the frequency at the beacon receiver, thus a beacon frequency variation of the satellite due to temperature changes and long-term operation. Therefore, in this paper, the beacon signal detection receiver is designed by using a very narrow band digital filter array for a faster acquisition and SNR(Signal to Noise Ratio) method detection. For this purpose, by calculating the satellite link budget with the rain attenuation between satellite and ground station, and then extracting the received $C/N_o$ of the beacon signal, this work derives the bandwidth and the array number of the configured digital filter that gives the required C/N.

A Message Authentication Scheme for V2V message based on RSSI with anonymity (익명성을 제공하는 RSSI기반 V2V 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.207-212
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) is a communication technology between vehicles and vehicles(V2V) or vehicles and infrastructures(V2I) for offering a number of practical applications. Considering the importance of communicated information through VANET, data authentication, confidentiality and integrity are fundamental security elements. Recently, to enhance a security of VANET in various circumstances, message authentication is widely researched by many laboratories. Among of them, Zhang. et. al. is an efficient method to authenticate the message with condition of anonymity in dense space. In the scheme, to obtain the vehicular ID with condition of anonymity, the k-anonymity is used. However it has a disadvantage, which conducts hash operations in case of determining the vehicular ID. In the paper, we present a location based algorithm using received signal strength for the location based authentication and encryption technique as well, and to enhance the accuracy of algorithm we apply a location determination technique over the 3-dimensional space.

From the Geography of Physical Space to the Geography of Virtual Space: Current and Future Research of the Information and Communication Geography and Virtual Geography (물리공간의 지리학에서 가상공간의 지리학으로: 정보통신지리학과 가상지리학의 연구동향과 가능성)

  • Kim, Young-Long
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.22 no.1
    • /
    • pp.70-83
    • /
    • 2019
  • This paper reviews how geographers have embraced the information and communication technology and expanded their perspectives from real space to virtual space. Information and communication geography research on the wired internet infrastructure began in the late 1990s, but the tradition has not been succeeded for the wireless internet technology. While the relationship-expansion, reproduction, and constraint-between real and virtual spaces have been studied by virtual geography scholars, we need more empirical research to reveal to what extent the two spaces impact to each other. To empirically investigate the physicality of the virtual, it will be useful to combine information and communication geography and virtual geography. However, it should be noted that empirical studies in the subfields can be criticized as being data- or technological deterministic.

Optimized KNN/SVM Algorithm for Efficent Indoor Location (효율적인 실내 측위를 위한 KNN/SVM 알고리즘)

  • Kang, Il-Woo;Sharma, Ronesh;Jeon, Seong-Min;Park, Sun;Lee, Seong-Ho;Na, Young-Hwa;Bae, Jinsoo;Jung, Min-A;Lee, Yeonwoo;Lee, Seong-Ro
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.602-605
    • /
    • 2011
  • 현재 측위에 대한 측정 대상이 점점 작아지면서, 그에 따른 정확도 까지 높아지고 있다. 실내 측위에 관한 기술은 대표적으로 단말기의 수신신호의 세기방식인 RSS(Received Signal Strength), 수신신호의 도달시간 방식 TOA(Time of Arrival), 수신 신호의 도달 시간차 방식 TDOA(Time Difference of Arrival), 수신신호의 입사각 방식인 AOA(Angle of Arrival) 등 여러 가지 기술이 활발히 진행되고 있다. 본 논문은 특수 장비를 사용하지 않고, 무선 네트워크 기반의 실내 측위 중에 정확도가 높은 Fingerprinting 방법을 택하였다. WLAN 기반 실내측위에 가장 많이 사용되는 KNN은 k개의 이웃수와 RP의 수에 따라 민감하다. 본 논문에서는 KNN 성능을 향상 시키기 위해 SVM 이용하여 SNR 데이터를 군집화를 적용한 KNN과 SVM을 혼합한 알고리즘을 제안하였다. 제안한 알고리즘은 신호잡음비 데이터를 KNN 방법에 적용하여 k개의 RP를 선택한 후 선택된 RP의 신호잡음비를 SVM에 적용하여 k개의 RP를 군집하여 분류한다. 실험 결과 위치 오차가 2m이내에 KNN/SVM 혼합 알고리즘이 KNN 알고리즘보다 성능이 우수하다.

Analysis and Demonstration of GPS Spoofing Attack: Based on Commercial Drones (GPS 스푸핑 공격 취약점 분석 및 실증: 상용 드론을 대상으로)

  • Jinseo Yun;Minjae Kim;Kyungroul Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.431-437
    • /
    • 2024
  • Drones in the contemporary landscape have transcended their initial public utility, expanding into various industries and making significant inroads into the private sector. The majority of commercially available drones are presently equipped with GPS receivers to relay location signals from artificial satellites, aiming to inform users about the drone's whereabouts. However, a notable drawback arises from the considerable distance over which these location signals travel, resulting in a weakened signal intensity. This limitation introduces vulnerabilities, allowing for the possibility of location manipulation and jamming attacks if the drone receives a stronger signal than the intended location signal from satellites. Thus, this paper focuses on the safety assessment of drones relying on GPS-based location acquisition and addresses potential vulnerabilities in wireless communication scenarios. Targeting commercial drones, the paper analyzes and empirically demonstrates the feasibility of GPS spoofing attacks. The outcomes of this study are anticipated to serve as foundational experiments for conducting more realistic vulnerability analysis and safety evaluations.

A Study On RTLS(Real Time Location System) Based on RSS(Received Signal Strength) and RSS Characteristics Analysis with the External Factors (외적요인에 따른 RSS 특성 분석과 이를 이용한 실시간 위치 추적 시스템 구현에 관한 연구)

  • Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.15 no.1
    • /
    • pp.76-85
    • /
    • 2011
  • In this paper, we analysed RSS characteristics by external factors and presented an efficient algorithm for real-time location tracking and its hardware system. The proposed algorithm enhanced the ranging accuracy using Kalman Filter based on the RSS DB. The location tracking system that consists of the tag, AP(Access Point), a data collector(Data Receiver) with IEEE 802.15.4(ZigBee) network environment, and location tracking application that reveal locations of each tag is implemented for the test environment. The location tracking system presented in this paper is implemented with MSP430 microprocessor manufactured by TI(Texas Instrument), CC2420 RF chipset and the location tracking application. With the results of the experiment, the proposed algorithm and the system can achieve the efficiency and the accuracy of location tracking with the average error of 19.12cm, and its standard deviation of 5.31cm in outdoor circumstance. Also, the experimental result shows that exact tracking of position in indoor circumstance cannot achieve because of vulnerable RSS with external circumstance.

A Hardwired Location-Aware Engine based on Weighted Maximum Likelihood Estimation for IoT Network (IoT Network에서 위치 인식을 위한 가중치 방식의 최대우도방법을 이용한 하드웨어 위치인식엔진 개발 연구)

  • Kim, Dong-Sun;Park, Hyun-moon;Hwang, Tae-ho;Won, Tae-ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.11
    • /
    • pp.32-40
    • /
    • 2016
  • IEEE 802.15.4 is the one of the protocols for radio communication in a personal area network. Because of low cost and low power communication for IoT communication, it requires the highest optimization level in the implementation. Recently, the studies of location aware algorithm based on IEEE802.15.4 standard has been achieved. Location estimation is performed basically in equal consideration of reference node information and blind node information. However, an error is not calculated in this algorithm despite the fact that the coordinates of the estimated location of the blind node include an error. In this paper, we enhanced a conventual maximum likelihood estimation using weighted coefficient and implement the hardwired location aware engine for small code size and low power consumption. On the field test using test-beds, the suggested hardware based location awareness method results better accuracy by 10 percents and reduces both calculation and memory access by 30 percents, which improves the systems power consumption.

Accurate Localization Scheme using Lateration in Indoor Environments (실내 환경에서 래터레이션을 이용한 위치 측위 기법)

  • Lim, Yu-Jin;Park, Jae-Sung
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.251-258
    • /
    • 2010
  • In an indoor localization method taking the lateration-based approach, the location of a target is estimated with the location of anchor points (APs) and the approximated distances between the target and APs using received signal strength (RSS) measurements. The accuracy of distance estimation affects the localization accuracy of a lateration-based method. Since a radio propagation environment varies randomly in time and space, the highest RSSs do not necessarily give the best estimation of the distances between a target and APs. Thus, all APs hearing a target have been used for localization. However, the accuracy of a lateration-based method degrades if more APs beyond a certain threshold are used because the area of polygon with the APs increases. In this paper, we focus on reducing the size of the polygon to further increase the localization accuracy. We use the centroid of the polygon as a reference point to estimate the relative location of a target in the polygon. Once the relative location is estimated, only the APs which are closest to the target are used for localization to reduce the area of the polygon with the APs. We validate the proposed method by implementing an indoor localization system and evaluating the accuracy of the proposed method in the various experimental environments.

A Study of the Korean Historical Development of Explosives Technology(Korean Traditional Explosive Technology) (화약기술발전의 사적고찰에 관한 연구 (한국의 고대 화약기술))

  • 나윤호;손선관
    • Journal of the Korean Professional Engineers Association
    • /
    • v.12 no.1
    • /
    • pp.12-20
    • /
    • 1979
  • The early history of gun powder (black powder) and explosives was closely connected with the discovery of methods of preparing and purifing salpetre (potassium nitrate KNO$_3$). The Chineses apparently became acquainted with salpetre firstly on about 11th century, and they were possibly the original discoverers of salpetre for raw material of gun powder. The Egyptians called it “Chinese snow”, and it is significant that Chingis-Khan, the Mongol conqueror, took the Chinese eenginees with him in 1218 to use it for attacking the fortifications of the Persian cities. The black powder was invented by chance by Chinese alchemists during the Song dynasty (11th century) in the process of manufacturing medicine, and the powder was introduced to Europe by Mongol army. The manufacturing method of salpetre and gun powder was introduced to Korea from China in 1374, and the powder alld gunnery manufacturing project was developed by Mu Sun Choe(崔茂宣), the first Korean engineer late in Koryo dynasty. Coming in to Yi dynasty the explosive technic, extractive method of salpetre, and gunnery manufacturing process were developed greatly by Mu Sun Choe and Hai Sin Choe (崔海臣). However, confronting with the Japanes invasion at Imjin War (1597) with more powerful western style rifles which had been introduced from the Portuguese, on the contrary Korean army with the traditional guns couldn't compete with them. The Chochong(烏銃, the western rifle introduced in Japane) were much superior to the Chinese style traditional guns in the shooting power and striking efficiency. On the other hand, the Japanese battle ships armed only with the Chochong, when confronted with the Korean turtle shaped ships under the commanding of Admiral Yi Sun-Sin(李舞臣), were defeated by the Korean canons on the ships. The technical development of the modern powder industry in Korea. with the construction of four big explosive plants from 1930 to 1945, has resulted the mass-production of explosives. This study was purposed to investigate to the process with regard to the details of introduction to the explosive technology in Korea, and intended to give a help to the engineers who are engaged in study of the explosive technics by means of giving a spot light data on the early process of the designs, and making suggestion to the researchers for further study and invent a new and modern explosive.

  • PDF

Development of MRI Simulator Early Diagnosis Program for Self Learning (자가 학습을 위한 MRI Simulator 초기 검사 프로그램 개발)

  • Jeong, Cheon-Soo;Kim, Chong-Yeal
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.9
    • /
    • pp.403-410
    • /
    • 2015
  • Since 1970, MRI has greatly been developing in terms of strength of magnetic field, the number of receipt channels, and short time of examination. With the development of digital systems and wireless network, hospitals have also acquired, saved, and managed digital images taken by various kinds of medical imaging equipment. However, domestic universities fail to provide practice training course independently thanks to expensive practice equipment and high maintenance cost, and rely on clinical training. Therefore, this study developed a MR patient diagnosis program based on Windows PC to help out students before their working in clinical filed. The designed Relational Database of MRI Simulator is made up of seven tables according to functions and data characteristics. Regarding the designed patient information, each stepwise function was classified by the patient registration method in clinical field. In addition, on the assumption of the basic information for diagnosis, each setting and content were classified. The menu by execution step was arrayed on the left side for easy view. For patient registration, a patient's name, gender, unique ID, birth date, weight, and other types of basic information were entered, and the patient's posture and diagnosis direction were set up. In addition, the body regions for diagnosis and Pulse Sequence were listed for selection. Also, Protocol name and other additional factors were allowed to be entered. The final window was designed to check diagnosis images, patient information, and diagnosis conditions. By learning how to enter patient information and change diagnosis conditions in this program, users will be able to understand more theories and terms learned in practice and thereby to shorten their learning time in actual clinical work.