• Title/Summary/Keyword: 무선전력전송

Search Result 1,152, Processing Time 0.037 seconds

Analysis of Shielding Characteristics for Induction Phenomenon Attenuation of Large Capacity Wireless Power Transmission Environment (대용량 무선전력전송 환경 유도현상 감쇄를 위한 차폐 특성 분석)

  • Chae, Dong-Ju;Kim, Young-Seok;Jung, Jin-Soo;Lim, Hyun-Sung;Cho, Sung-Koo;Hong, Seong-Jun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1844-1851
    • /
    • 2017
  • As the capacity of the wireless power transmission increases, a higher supply current which may induce current in nearby conductive parts requires. Induced current may affect electric shock to the human body and malfunction of the electrical equipment. In order to prevent such induced phenomena as a risk factor, shielding is required between the source of the wireless power transmission and the conductive parts. The resonance frequency for the large capacity wireless power transmission has the wavelength of several hundred meters, so most environments are included in the near-field area. By wave impedance, the electric field has higher density in the near-field area and needs to be analyze for protecting. For this purpose, it is necessary to select a substance having a larger electric conductivity and optimized shielding structure. In this paper, an aluminum base shielding structure was presented to conduct experiments on thickness, position, and heat dissipation. In the 35 kW, 60 kHz environments, the optimized 5T Al base shielding structure attenuates the induced current to 43 %.

Analysis of the S-MAC/T-MAC Protocol for Wireless Sensor Networks (무선 센서망의 에너지 효율적 MAC(S-MAC/T-MAC) 성능 분석)

  • Lee Woo-Chul;Lee Yoo-Tae;Kim Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.99-103
    • /
    • 2006
  • In this paper, we focus on the problem of designing an energy efficient MAC protocol for wireless sensor networks and analyze S(Sensor)-MAC and T(Time-out)-MAC. S-MAC is based on the concept of the 'listen/sleep mode cycle'. This applies message passing to reduce contention latency for sensor-network applications that require store-and-forward processing as data moves through the network. However unlike the S-MAC, where the duration of the cycle is fixed, T-MAC introduces an adaptive duty cycle in a novel way: by dynamical ending the active part of it. This reduces the amount of energy wasted on idle listening, in which nodes wait for potentially incoming messages while still maintaining a reasonable throughput. In this paper we discuss the design of these two Protocols. We analyze them from the aspect of latency, throughput, and power savings when using the OMNeT++ simulator in various environments.

  • PDF

Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption (Dragon-MAC: 인증 암호를 이용한 효율적인 무선센서네크워크 보안)

  • Lim, Shu-Yun;Pu, Chuan-Chin;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1519-1527
    • /
    • 2007
  • In order to combat the security threats that sensor networks are exposed to, a cryptography protocol is implemented at sensor nodes for point-to-point encryption between nodes. Given that nodes have limited resources, symmetric cryptography that is proven to be efficient for low power devices is implemented. Data protection is integrated into a sensor's packet by the means of symmetric encryption with the Dragon stream cipher and incorporating the newly designed Dragon-MAC Message Authentication Code. The proposed algorithm was designed to employ some of the data already computed by the underlying Dragon stream cipher for the purpose of minimizing the computational cost of the operations required by the MAC algorithm. In view that Dragon is a word based stream cipher with a fast key stream generation, it is very suitable for a constrained environment. Our protocol regarded the entity authentication and message authentication through the implementation of authenticated encryption scheme in wireless sensor nodes.

Transmission Latency-Aware MAC Protocol Design for Intra-Body Communications (인체 채널에서 전자기파 전송 지연 특성을 고려한 다중 매체 제어 프로토콜 설계)

  • Kim, Seungmin;Park, JongSung;Ko, JeongGil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.8
    • /
    • pp.201-208
    • /
    • 2019
  • Intra-Body Communication (IBC) is a communication method using the human body as a communication medium. The fact that our human body consists of water and electrolyte allow such communication method could work and have strength in low-power. However, because the IBC directly affects to human body by using it as a medium, there was a lack of research in communication protocols of each communication layer. In this paper, we suggests MAC parameters which affects the performance of communication in human body channel, and propose new MAC protocol. Our results shows that our MAC is suitable for supporting high data rate applications with comparable radio duty cycle performance.

Analysis of Indoor Channel Modeling in Millimeter-Wave Band (밀리미터파 대역의 실내 채널 모델링 분석)

  • Lee, Won-Hui;Pyo, Seongmin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.53-58
    • /
    • 2016
  • A ray tracing method to analyze the propagation channel characteristics for a millimeter-wave indoor wireless communication system is presented. Reflected rays from planar as well as rough surfaces are included. Transmitted rays though a thin dielectric slab are considered. Maps representing received power levels and RMS delay spread from a transmitter in a rectangular room are shown. The received power levels in the empty room for bottom's roughness factors of 0 and 0.13 are represented. The simulation results are well consistent with the calculation of Friis equation with reflection coefficient. Any size of furniture the shape of plane form can be positioned anywhere in the room.

Power Transmission Mechanism and Data Communication of the Dosimeter using Contactless Powerless Transmission (선량계의 무선전력 전송 메카니즘과 데이터 통신 시스템 구현)

  • Lee, Seung-Min;Chung, Sung-In;Lee, Heung-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.4
    • /
    • pp.814-819
    • /
    • 2010
  • This study proposes the antenna circuit design for the transmitting wireless power, the development of the RF non-contact type Dosimeter. That is, the study designed the optimization and numerical analysis of the antenna circuit for the antenna design of 13.56MHz over the frequency bands for transmitting wireless power. We studied the needed items in the existing RF type Dosimeter with battery to implement the wireless power non-contact Dosimeter within the battery. We compared to the real measurement value as calculating the value of the inductance and capacitance through the numerical analysis for the antenna LC resonance using the theory of the electromagnetic induction method. This method to drive low power is designed to simplify the circuit and to improve the efficiency of the rectifier. We convince our research contributes not only to understand the simplified circuit and miniaturization, but also to help the design and application technology of the wireless power transmit system which is received power supply with wireless.

A Effective Group Key Management for Ad Hoc Network Nodes (Ad-Hoc 네트워크의 노드 인증을 위한 효과적인 그룹 키 관리기법)

  • Lee Pung-Ho;Han In-Sung;Joo Hyeon-Kyu;Kim Jin-Mook;Ryou Hwang-Bin
    • Annual Conference of KIPS
    • /
    • 2006.05a
    • /
    • pp.1023-1026
    • /
    • 2006
  • 에드 혹 네트워크는 불규칙한 이동성을 지닌 다수의 노드들에 의해 자율적으로 구성되는 네트워크이다. 그러나 에드 혹 네트워크는 저 전력, 낮은 프로세싱 능력, 무선채널이라는 에드 혹 네트워크만의 특징으로 인해 패킷 드롭, 재전송 공격, 서비스 거부 공격, 비잔틴 공격, 신원사칭과 같은 보안상 여러 가지 공격에 취약하다는 문제점을 안고 있다. 때문에 이러한 취약점을 개선하려는 방안으로 노드 간에 인증, 기밀성, 무결성을 비롯한 여러 가지 요소를 충족시키기 위한 보안기법이 연구되어 왔다, 그러나 Ad Hoc 네트워크는 기존의 회선을 사용하는 정적인 형태의 네트워크가 아닌 시간에 동적으로 네트워크 구조가 변화하며, 네트워크에서 불규칙한 이동성을 지닌 노드들은 적은양의 자원을 소유하는 원인으로 인해 기존의 보안기법은 효과적이지 못하다. 본 논문에서는 신뢰성이 확보된 이웃 노드 간에 그룹을 형성하고, 그룹멤버의 안전성을 입증하는 그룹 인증서를 생성하여 그룹에 접근하는 단일노드 혹은 또 다른 그룹간의 인증을 수행하는 기법을 제안한다. 또한 그룹 멤버 간에 그룹 키를 생성하여 데이터 유출에 대한 위험성 문제를 해결하고, 인증과 기밀성 유지로 인한 자원소비를 감소시킬 수 있도록 하였다.

  • PDF

The characteristics of Resonant class ${\phi}_2$ Inverter for short range wireless power transmission (근거리 무선전력전송용 공진형 Class ${\phi}_2$ 인버터 동작 특성)

  • Yang, Hae-Youl;Park, Jae-Hyun;Kim, Chang-Sun
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.13-14
    • /
    • 2011
  • The power conversion converter for driving the wireless power transfer system is can be into the two part of the DC power conversion rectifier and the high frequency dc-ac power conversion inverter. In this paper, The operating characteristics of the Class-${\Phi}_2$ resonant inverter have been investigated through by simulation and by experiment. It can be switched at a high frequency without the switching losses and the harmonics are reduced effectively due to the input LC filter. Its switching frequency is 1MHz and the input voltage is 96V which is the output voltage of LLC resonant converter. And its output peak voltage is 170V. The resonant inverter module operated at the commercial power source of 220V was built. And also the electromagnetic coupled resonance coils were designed for wireless power transfer with a 1MHz operating frequency. As a experimental result, the wireless power transmission was confirmed and it is varified the validity of the experiment.

  • PDF

Low-power Routing Algorithm using Routing History Cache for Wireless Sensor Network (RHC(Routing History Cache)를 사용한 저전력 소모 라우팅 알고리즘)

  • Lee, Doo-Wan;Jang, Kyung-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2441-2446
    • /
    • 2009
  • Wireless Sensor Network collects a data from the specific area and the control is composed of small sensor nodes. Like this sensors to after that is established at the beginning are operated with the battery, the operational duration until several years must be continued from several months and will be able to apply the resources which is restricted in efficiently there must be. In this paper RHC (rounting history cache) applies in Directed Diffusion which apply a data central concept a reliability and an efficiency in data transfer course set. RHC algorithms which proposes each sensor node updated RHC of oneself with periodic and because storing the optimization course the course and, every event occurrence hour they reset the energy is wasted the fact that a reliability with minimization of duplication message improved.

A Study on the On-Board Interface for Smartphones (스마트폰을 위한 OBD2 인터페이스 제공 방안)

  • Hong, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.410-411
    • /
    • 2018
  • In this paper, In this paper, Smart OBD2 terminal collects OBD2 Data on the vehicle. And it passes through this with SmartPhone Bluetooth. OBD2 system is the system to use a variety of Service using it in SmartPhone. Utilizing NFC to help ordinary people, it can easily use to configure the Bluetooth Pairing. By using the Bluetooth 4.0, it is maximized compatibility of Bluetooth. Furthermore OBD2 terminal is a system to minimize the standby power of the terminal to prevent the discharge of the vehicle up issues. Anyone can develop an OBD2 connection App by providing the interfaces to make DB to develop and understand ODB2 data.

  • PDF