• Title/Summary/Keyword: 무선 컴퓨팅

Search Result 760, Processing Time 0.026 seconds

A Study on the Enhancement of Network Survivability through Smart Sensor Technologies Convergence (스마트 센서 기술 융합을 통한 망 생존성 강화에 관한 연구)

  • Yang, Jung-Mo;Kim, Jeong-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.269-276
    • /
    • 2016
  • Public Safty-LTE(Long Term Evolution) is being deployed in the direction of reducing cost by using both of municipal network and commercial network. However, LTE Network is difficult to ensure the survivability during the information communication infrastructure failures. In addition, it is vulnerable in communication coverage of inside buildings and underground. In this study, we propose to implement effectively the network survivability technique through the convergence to the proven technology. As the advent of the IoT Age, smart sensors which are embedded in the environment and the things will be able to provide a useful infrastructure for ensuring the network survivability. Based on the feature of the smart sensor, we designed the sink node architecture to guarantee the network survivability in disaster situation through the convergence of the small cell technology and extension of wireless network coverage technology. The computing power inherent in the environment is a valuable resource that can be utilized in the disaster situation.

A Study about problem and a correspondence strategy along a beauty culture-Ubiquitous implementation (미용 부분의 유비쿼터스 구현에 따른 문제점과 대응전략에 관한 연구)

  • Lim Jin-Sook;Kang Jang-Mook
    • Journal of Digital Contents Society
    • /
    • v.5 no.3
    • /
    • pp.163-170
    • /
    • 2004
  • Ubiquitous is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the informatization revolution that Cyber Space saw a prime while world wide web service was expended was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous technology. Also, I presented the plan that derivation tried a problem about Ubiquitous, and can solve an each problem. Specially, infringement about personal privacy very has a lot of possession to occur in the world that radio communication between all appliances is possible. It is Ubiquitous by becoming the data which is useful to thorough preparation about the Ubiquitous world to come with presenting policy a little technical solution plan about this to the future Republic of Korea. many company has been cracked by crackers information security and everyday new computer virus come out.

  • PDF

An Implementation of Context-Awareness Support System based on Voice Service for Medical Environments (의료 환경을 위한 음성 서비스 기반의 상황인식 지원 시스템의 구현)

  • Shim, Choon-Bo;Shin, Yang-Won;Park, Byung-Rae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.29-36
    • /
    • 2005
  • As computing environments are more rapidly developed, an adaptive and intelligent services using post PC such as PDA. Laptop, and Tablet PC in case of rounding and examining patients are highly demanded. The objective of this study is to design and implement a context-awareness support system based on voice service for medical environments. To achieve it, we propose a context middleware which plays an important role in recognizing a client with PDA by using a Bluetooth wireless communication technology as well as in executing an appropriate execution module, like delivery for diagnosis information of patients, according to the staff's context acquired from a context server. In addition, the context server functions as a manager that efficiently stores context information such as client's current status, physical environment, and device resources into a database server. Finally, for verifying the usefulness of the proposed system, we develop an application system which provides voice playing services for notification of other physicians through our context middleware.

  • PDF

Design of an Edge Computing System using a Raspberry Pi Module for Structural Response Measurement (구조물 응답측정을 위한 라즈베리파이를 이용한 엣지 컴퓨팅 시스템 설계)

  • Shin, Yoon-Soo;Kim, Junhee;Min, Kyung-Won
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.32 no.6
    • /
    • pp.375-381
    • /
    • 2019
  • Structural health monitoring to determine structural conditions at an early stage and to efficiently manage the energy requirements of buildings using systems that collects relevant data, is under active investigation. Structural monitoring requires cutting-edge technology in which construction, sensing, and ICT technologies are combined. However, the scope of application is limited because expensive sensors and specialized technical skills are often required. In this study, a Raspberry Pi module, one of the most widely used single board computers, a Lora module that is capable of long-distance communication at low power, and a high-performance accelerometer are used to construct a wireless edge computing system that can monitor building response over an extended time period. In addition, the Raspberry Pi module utilizes an edge computing algorithm, and only meaningful data is obtained from the vast amount of acceleration data acquired in real-time. The raw data acquired using Wi-Fi communication are compared to the Laura data to evaluate the accuracy of the data obtained using the system.

An Adaptive Person/Vehicle Detection Algorithm for PIR Sensor (적외선 센서 기반의 사람/차량 탐지 적응 알고리즘)

  • Kim, Young-Man;Park, Jang-Ho;Kim, Li-Hyung;Park, Hong-Jae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.8
    • /
    • pp.577-581
    • /
    • 2009
  • Recently, various new services based on ubiquitous computing and networking have been developed. In this paper, we contrive Adaptive PIR(Pyroelectric Infrared Radiation) Detection Algorithm (APIDA), a PIR-sensor based digital signal processing algorithm, that detects the movement of an invading object by the recognition of heat change in the detection area, since the object like person or car emits heat(i.e., infrared radition), We devised APIDA as a highly reliable signal processing algorithm that increases the successful detection rate and decreases the false alarm rate in the intruding object detection. According to performance evaluation experiment, APIDA shows the successful detection rate of 90% and low false alarm in the plain area.

Ubiquitous healthcare model based on context recognition (상황인식에 기반한 유비쿼터스 헬스케어 모델)

  • Kim, Jeong-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.129-136
    • /
    • 2010
  • With mobile computing, wireless sensor network and sensor technologies, ubiquitous computing services are being realized and could satisfy the feasibility of ubiquitous healthcare to everyone. This u-Healthcare service can improve life quality of human since medical service can be provided to anyone, anytime, and anywhere. To confirm the vision of u-Healthcare service, we've implemented a healthcare system for heart disease patient which is composed of two components. Front-end collects various signals such as temperature, blood pressure, SpO2, and electrocardiogram, etc. As a backend, medical information server accumulates sensing data and performs back-end processing. To simply transfer these sensing values to a medical team may be too trivial. So, we've designed a model based on context awareness for more improved medical service which is based on artificial neural network. Through rigid experiments, we could confirm that the proposed system can provide improved medical service.

A Study on RFID System Based on Cloud (클라우드 기반 RFID 시스템에 관한 연구)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1145-1150
    • /
    • 2020
  • After the Davos Forum, the recent 4th Industrial Revolution has become an area of interest to countries around the world. Among the technologies of the 4th industrial revolution, the ubiquitous computing environment requires a convergence environment of various devices, networks, and software technologies, and the RFID technology that identifies objects among the IoT technology fields is applied to all industries and has a competitive edge. Systems to which RFID technology is applied are being used in various industrial fields, especially! It is efficiently used for accurate inventory management and SCM management in the field of distribution and logistics. If the RFID system is built in a cloud-based environment, it will be possible to secure reliability in distribution management in consideration of an effective logistics management system and economic feasibility. This study is a study on the RFID system in a cloud computing environment to reduce the cost of operating or maintaining an application server to improve the economy and reliability.

UAV-MEC Offloading and Migration Decision Algorithm for Load Balancing in Vehicular Edge Computing Network (차량 엣지 컴퓨팅 네트워크에서 로드 밸런싱을 위한 UAV-MEC 오프로딩 및 마이그레이션 결정 알고리즘)

  • A Young, Shin;Yujin, Lim
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.12
    • /
    • pp.437-444
    • /
    • 2022
  • Recently, research on mobile edge services has been conducted to handle computationally intensive and latency-sensitive tasks occurring in wireless networks. However, MEC, which is fixed on the ground, cannot flexibly cope with situations where task processing requests increase sharply, such as commuting time. To solve this problem, a technology that provides edge services using UAVs (Unmanned Aerial Vehicles) has emerged. Unlike ground MEC servers, UAVs have limited battery capacity, so it is necessary to optimize energy efficiency through load balancing between UAV MEC servers. Therefore, in this paper, we propose a load balancing technique with consideration of the energy state of UAVs and the mobility of vehicles. The proposed technique is composed of task offloading scheme using genetic algorithm and task migration scheme using Q-learning. To evaluate the performance of the proposed technique, experiments were conducted with varying mobility speed and number of vehicles, and performance was analyzed in terms of load variance, energy consumption, communication overhead, and delay constraint satisfaction rate.

Direct Actuation Update Scheme based on Actuator in Wireless Networked Control System (Wireless Networked Control System에서 Actuator 기반 Direct Actuation Update 방법)

  • Yeunwoong Kyung;Tae-Kook Kim;Youngjun Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.125-129
    • /
    • 2023
  • Age of Information (AoI) has been introduced in wireless networked control systems (WNCSs) to guarantee timely status updates. In addition, as the edge computing (EC) architecture has been deployed in NCS, EC close to sensors can be exploited to collect status updates from sensors and provide control decisions to actuators. However, when lots of sensors simultaneously deliver status updates, EC can be overloaded, which cannot satisfy the AoI requirement. To mitigate this problem, this paper uses actuators with computing capability that can directly receive the status updates from sensors and determine the control decision without the help of EC. To analyze the AoI of the actuation update via EC or directly using actuators, this paper developed an analytic model based on timing diagrams. Extensive simulation results are included to verify the analytic model and to show the AoI with various settings.

The Design and Implementation of User Authorization Module based on Zigbee for Automotive Smart-key System (차량용 스마트키 시스템을 위한 지그비 기반의 사용자 인증 모듈 설계 및 구현)

  • Kim, Kyeong-Seob;Lee, Yun-Seob;Yun, Hyun-Min;Choi, Sang-Bang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2442-2450
    • /
    • 2010
  • Using sensor devices applied to various objects will be needed wireless network that it is easy to install in them. Tiny devices configured to processor that bas comparatively low computing ability are inappropriate to use devices that are wireless LAN, etc. In result, network devices needed to not only have simple communication protocol, but have Plug and Play function that it works as soon as it connects without installing any device driver. it also will industrially have both low power and low cost because of mobility of it. From IEEE 802.11 standard, WPAN(Wireless Personal Area Network) included in LAN is being developed by WPAN WG(Working Group) on area with low power consumption and low complexity. In addition to, it is standardizing MAC and PRY of the standard that is expected to wirelessly communicate within 10m. WPAN will be used generally in the more near future because of both low power and low cost of Zigbee. In this paper we designed zigbee based user authentication module for a automotive smart-key system.