• Title/Summary/Keyword: 스마트워크 시스템

Search Result 672, Processing Time 0.028 seconds

Performance Analysis of Collaborative Wideband Sensing Scheme based on Energy Detection with User Selection for Cognitive Radio (에너지검출 기반 협력 광대역 센싱에서 사용자 선택에 따른 센싱 성능 분석)

  • Lee, Mi-Sun;Kim, Yoon-Hyun;Kim, Jin-Young
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.72-77
    • /
    • 2011
  • Spectrum sensing is a critical functionality of CR network; it allow secondary user to detect spectral holes and to opportunistically use under-utilized frequency bands without causing harmful interference to primary use. Recently, wideband service has been increase for processing abundance of data traffic. So CR network needs a realizable implementation design of spectrum sensing for wideband. To get high resolution performance of wideband sensing must precede algorithm processing for reliability signal detection. By the way, the performance of spectrum sensing can be degraded due to fading and shadowing. In order to overcome this problem, we propose system model of wideband sensing scheme on energy detected collaborative technique. we divide wideband into narrowbands and use narrowbands to detect signal excepting some narrowbands including bad channel through the CSI. And we simulate and analyze in terms of detection probability with various SNR.

Design And Implementation of WebDAV Virtual Storage System based on Android (안드로이드 기반의 WebDAV 가상 스토리지 시스템의 설계 및 구현)

  • Kim, Sang-Geon;Byun, Sung-Jun;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.669-671
    • /
    • 2010
  • IStorage is a technology, which can use resources of server PC by using Android Phone supporting wireless internet access. IStorage utilizes resources of server PC through WebDAV protocol. And with GUI interface, Users upload their resources to the server PC and They can perform various kinds of works like Opening, Searching, Deleting and Downloading files. Since it is possible for them to use resources of server PC as if they are originally stored in their mobile devices, there is no limit on using the functions such as watching movies, listening musics and opening document files in real time. We expect this study can to overcome the limitation of storage space and also be a useful technology in the smart phone market.

  • PDF

The Blockchain based Undeniable Multi-Signature Scheme for Protection of Multiple Authorship on Wisdom Contents (지혜콘텐츠 공동저작권 보호에 적합한 블록체인 기반 부인봉쇄 다중서명 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.2
    • /
    • pp.7-12
    • /
    • 2021
  • Wisdom Contents are created with experiences and ideas of multiple authors, and consumed in Internet based Social Network Services that are not subjected to regional restrictions. Existing copyright management systems are designed for the protection of professional authors' rights, and effective in domestic area. On the contrary, the blockchain protocol is subjected to the service and the block is added by the consensus of participating nodes. If the data is stored to the blockchain, it cannot be modified or deleted. In this paper, we propose the blockchain based undeniable multi-signature scheme for the protection of multiple authorship on Wizdom Contents. The proposed scheme is consisted of co-authors' common public key generation, multi-signature generation and verification protocols. In the undeniable signature scheme, the signature cannot be verified without help of the signer. The proposed scheme is best suited to the contents purchase protocol. All co-authors cannot deny the fairness of the automated profit distribution through the verification of multiple authorship on Wizdom Contents.

Brain Correlates of Emotion for XR Auditory Content (XR 음향 콘텐츠 활용을 위한 감성-뇌연결성 분석 연구)

  • Park, Sangin;Kim, Jonghwa;Park, Soon Yong;Mun, Sungchul
    • Journal of Broadcast Engineering
    • /
    • v.27 no.5
    • /
    • pp.738-750
    • /
    • 2022
  • In this study, we reviewed and discussed whether auditory stimuli with short length can evoke emotion-related neurological responses. The findings implicate that if personalized sound tracks are provided to XR users based on machine learning or probability network models, user experiences in XR environment can be enhanced. We also investigated that the arousal-relaxed factor evoked by short auditory sound can make distinct patterns in functional connectivity characterized from background EEG signals. We found that coherence in the right hemisphere increases in sound-evoked arousal state, and vice versa in relaxed state. Our findings can be practically utilized in developing XR sound bio-feedback system which can provide preference sound to users for highly immersive XR experiences.

A Study on Mobility-Aware Edge Caching and User Association Algorithm (이동성 기반의 엣지 캐싱 및 사용자 연결 알고리즘 연구)

  • TaeYoon, Lee;SuKyoung, Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.2
    • /
    • pp.47-52
    • /
    • 2023
  • Mobile Edge Computing(MEC) is considered as a promising technology to effectively support the explosively increasing traffic demands. It can provide low-latency services and reduce network traffic by caching contents at the edge of networks such as Base Station(BS). Although users may associate with the nearest BSs, it is more beneficial to associate users to the BS where the requested content is cached to reduce content download latency. Therefore, in this paper, we propose a mobility-aware joint caching and user association algorithm to imporve the cache hit ratio. In particular, the proposed algorithm performs caching and user association based on sojourn time and content preferences. Simulation results show that the proposed scheme improves the performance in terms of cache hit ratio and latency as compared with existing schemes.

Digital Twin Model Design And Implementation Using UBS Process Data (UBS공정 데이터를 활용한 디지털트윈 모델 설계 및 구현)

  • Park, Seon-Hui;Bae, Jong-Hwan;Ko, Ho-Jeong
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.3
    • /
    • pp.63-68
    • /
    • 2022
  • Due to COVID-19, many paradigm shifts in existing manufacturing facilities and the expansion of non-face-to-face services are accelerating worldwide. A representative technology is digital twin technology. Such digital twin technology, which existed only conceptually in the past, has recently become feasible with the construction of a 5G-based network. Accordingly, this paper designed and implemented a part of the USB process to enable digital twins based on OPC UA communication, which is a standard interlocking structure, between real object objects and virtual reality-based USB process in accordance with this paradigm change. By reflecting the physical characteristics of real objects together, it is possible to simulate real-time synchronization of these with real objects. In the future, this can be applied to various industrial fields, and it is expected that it will be possible to reduce costs for decision-making and prevent dangerous accidents.

A Public Opinion Polling Application with Robust Verification Based on the Ethereum Bolckchain (견고한 검증을 제공하는 이더리움 블록체인 기반의 여론조사 어플리케이션)

  • Jin, Jae-Hwan;Eom, Hyun-Min;Sun, Ju-Eun;Lee, Myung-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.3
    • /
    • pp.895-905
    • /
    • 2018
  • Public opinion polls have a strong influence on modern society as a means of examining the tendency of social groups on specific issues. As the influence of the polls increases, the problem of forgery and falsification of the results becomes an important issue. So, to guarantee the reliability of the results, our society needs novel mechanisms. As one of such mechanisms, the Ethereum blockchain is an environment for developing decentralized applications with the reliable blockchain technology. Ethereum decentralized applications can utilize smart contracts to provide services for users in transparent and reliable ways. In this paper, we propose a polling method that guarantees reliability using the blockchain technology, which is a distributed ledger technique that makes forgery or falsification actually impossible. The proposed method provides a robust verification function on the results of the associated polls for individual voters and verification organizations. Also, we present a distributed opinion polling application running on our private Ethereum blockchain network, showing the effectiveness of the proposed method.

Developing a Transit Assignment Model Considering Waiting Time Variation and Line Capacity (대기시간변동 및 용량을 고려한 대중교통 통행배정모형)

  • Kim, Jin Howan;Kim, Dong Sun;Kim, Ji Hyun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.5
    • /
    • pp.1525-1534
    • /
    • 2014
  • In recent years, the passengers are likely to decide their route on impulse due to the development of the integrated public transport system, and real-time information system. Especially, public transport fare integration in Seoul Metropolitan area, 2004 makes them not to have resistance about changing the modes or routes and their route choice is most effected by the degree of congestion. Assignment model have limitations to describe route changes by congestion. In this study, the concept of a link cost function used in road assignment and Effective frequency is introduced to describe the passengers' behavior when the capacity of public transport is over and the waiting time variation. Two situations, new transit line operation and accident, are set up to validate the model, as a result of the transit assignment by this model, the traffic on networks is not over the capacity. It is expected that this study will be of help to reflect the various behaviors in transit assignments.

Development of a deep-learning based automatic tracking of moving vehicles and incident detection processes on tunnels (딥러닝 기반 터널 내 이동체 자동 추적 및 유고상황 자동 감지 프로세스 개발)

  • Lee, Kyu Beom;Shin, Hyu Soung;Kim, Dong Gyu
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.20 no.6
    • /
    • pp.1161-1175
    • /
    • 2018
  • An unexpected event could be easily followed by a large secondary accident due to the limitation in sight of drivers in road tunnels. Therefore, a series of automated incident detection systems have been under operation, which, however, appear in very low detection rates due to very low image qualities on CCTVs in tunnels. In order to overcome that limit, deep learning based tunnel incident detection system was developed, which already showed high detection rates in November of 2017. However, since the object detection process could deal with only still images, moving direction and speed of moving vehicles could not be identified. Furthermore it was hard to detect stopping and reverse the status of moving vehicles. Therefore, apart from the object detection, an object tracking method has been introduced and combined with the detection algorithm to track the moving vehicles. Also, stopping-reverse discrimination algorithm was proposed, thereby implementing into the combined incident detection processes. Each performance on detection of stopping, reverse driving and fire incident state were evaluated with showing 100% detection rate. But the detection for 'person' object appears relatively low success rate to 78.5%. Nevertheless, it is believed that the enlarged richness of image big-data could dramatically enhance the detection capacity of the automatic incident detection system.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.