• Title/Summary/Keyword: 원거리 네트워크

Search Result 112, Processing Time 0.037 seconds

Intelligent Mobile Surveillance System Based on Wireless Communication (무선통신에 기반한 지능형 이동 감시 시스템 개발)

  • Jang, Jae-Hyuk;Sim, Gab-Sig
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.11-20
    • /
    • 2015
  • In this paper, we develop an intelligent mobile surveillance system based on binary CDMA for the unmanned automatic tracking and surveillance. That is, we implement a intelligent surveillance system using the binary CDMA wireless communication technology which is applied the merit of CDMA and TDMA on it complexly. This system is able to monitor the site of the accident on network in real time and process the various situations by implementing the security surveillance system. This system pursues an object by the 360-degree using camera, expands image using a PTZ(Pan/Tilt/Zoom) camera zooming function, identifies the mobile objects image within a screen and transfers the identified image to the remote site. Finally, we show the efficiency of the implemented system through the simulation of the controlled situations, such as tracking coverage on objects, object expansion, object detection number, monitoring the remote transferred image, number of frame per second by the image output signal etc..

Mobile Application Development for Irrigation Facilities and water Management (수리시설 및 물 관리를 위한 모바일 어플리케이션 개발)

  • Kim, Jin-Taek;Oh, Seoung-Tae;La, Min-Chul
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.443-443
    • /
    • 2012
  • 최근 지구 온난화 및 기후변화로 인하여 국지적 집중호우에 의한 농지 침수 및 유실 피해가 점차 증가 추세에 있으며 가뭄에 의한 물 부족 현상도 심화되고 있다. 이와 같은 홍수 및 가뭄 피해에 대비하기 위하여 농업용 저수지와 수문 그리고 농수로와 같은 농업수리시설물이 신축 운영되고 있으나 이들 시설물은 비교적 규모가 작은 대신에 그 수가 매우 많고 또한 지역적으로 널리 산재해 있기 때문에 관리자가 이들을 효율적으로 운영하고 관리하는데 한계가 있다는 특징이 있다. 더욱이 이들 시설물은 물과 항상 접하는 철근 콘크리트 구조물로 이루어져 있어서 시간이 경과함에 따라 균열발생과 철근부식과 같은 노후화 현상이 뚜렷하게 진전되어 정기적 안전점검이 필요한 실정이다. 이에 따라 농업수리시설을 보다 체계적으로 관리하고 농업용수를 보다 효율적으로 확보 운영하기 위하여 물관리 자동화 사업이 추진되어 많은 개선이 이루어졌으나 아직까지 현장업무가 관리자의 수작업에 의존하고 있으며 농촌 용수의 정확한 정보가 제때에 제공되지 못하는 등 농업수리시설에 대한 다양한 요구를 충족시키지 못하고 있다. 따라서, 농촌수자원의 효율적 관리를 위하여 농업수리시설 가운데 하나인 농수로의 수위 및 유량 정보를 자동으로 측정하며 농업수리시설물의 상태 정보를 입력하고 관리할 수 있는 모바일 App을 개발하였다. 안드로이드 OS 기반의 스마트폰을 활용하였으며 여기에는 시설물 고유정보가 포함된 QR코드 및 Active 태그를 통하여 시설물의 상태정보를 원격에 있는 서버 컴퓨터로 전송할 수 있는 원거리 무선통신 모듈이 구비되어 있다. 특히, 농업수리시설물 관리 어플리케이션은 현장관리자가 기존에 수기방식으로 시설물을 관리해 오던 것을 휴대단말 상에서 보다 효율적으로 관리를 함으로써 시설물 유지관리 업무의 효율성을 향상시키는 특징이 있다.

  • PDF

Performance Improvement of Distributed Compressive Video Sensing Using Reliability Estimation (신뢰성 예측을 이용한 분산 압축 비디오 센싱의 성능 개선)

  • Kim, Jin-soo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.6
    • /
    • pp.47-58
    • /
    • 2018
  • Recently, remote sensing video applications have become increasingly important in many wireless networks. Distributed compressive video sensing (DCVS) framework in these applications has been studied to reduce encoding complexity and to simultaneously capture and compress video data. Specially, a motion compensated block compressed sensing with smoothed projected Landweber (MC-BCS-SPL) has been actively researched for one useful algorithm of DCVS schemes, However, conventional MC-BCS-SPL schemes do not provide good visual qualities in reconstructed Wyner-Ziv (WZ) frames. In this paper, the conventional schemes of MC-BCS-SPL are described and then upgraded to provide better visual qualities in WZ frames by introducing reliability estimate between adjacent key frames and by constructing efficiently motion-compensated interpolated frames. Through experimental results, it is shown that the proposed algorithm is effective in providing better visual qualities than conventional algorithm.

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

A Design and Implementation of Bulk Data Transmission Tool based on UDT (UDT 기반의 대용량 데이터 전송도구 설계 및 구현)

  • Park, Jong-Seon;Kim, Seung-Hae;Hwang, Gun-Joon;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.2
    • /
    • pp.23-31
    • /
    • 2012
  • With advance of high bandwidth network infrastructure, the requirement is dramatically increasing to cooperate between the users who are far from each other and make use of bulk data. However, as the prominent data transmission protocol, it is well known that TCP suffers some degrees of inefficiency for bulk data transmission when RTT is relatively big. So, some works are on going to suggest a new transmission method to utilize the bandwidth in effective. UDT(UDP-based Data Transfer protocol) is one of these. It is a UDP based application level protocol which can guarantee reliability and stability. much like as TCP. In this paper, we present a design and implementation of UDT based bulk data transmission tool by applying parallel and compressive techniques. The implementation result is examined to measured its performance improvement on a real test-bed, and then compared with existing bulk data transmission tools. Experimental results show that proposed tool is more stable and shows greater performance than that of native UDT. Especially, the performances show 244% improvement in RTT 400ms without losses and 229% in RTT 250ms with 0.005% losses respectively.

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

Impact of Information and Communication Technologies on Spatial Structure (정보화와 정보기술이 공간구조에 미친 영향)

  • 박삼옥;최지선
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.6 no.1
    • /
    • pp.119-144
    • /
    • 2003
  • This study attempts to figure out the impact of Information and communication technologies (ICTs) on spatial structure and to speculate on spatial strategies in the electronic economy from a geographical perspective. The unprecedented development of ICTs based on the explosive use of the Internet was enough to lead to the expectation that physical distance would not be a significant barrier in business activities. In fact, however, at least at a current stage, the development of ICTs has not automatically removed the inequality in spatial structure. The accessibility to electronic space is different by economic and social status within a country as well as between countries. The importance of place, locality, and place-specific assets has been strengthened in the global economy. Physical proximity is still of great importance because it helps to minimize transaction costs, to exploit place-specific social networks, and to accumulate credibility for successful businesses. Likewise, the development of electronic commerce such as B2B and B2C EC also does not necessarily result in the ignorance of place and locality. Rather, the recognition of the importance of spatial strategies is extremely important for the success in online businesses. As a conclusion, the spatial dimension becomes more important in the digital era for successful businesses and balanced regional developments than ever before. The need for the improvement of ICT infrastructures, the development of human resources, and the establishment of regional innovation systems in peripheral areas cannot be overemphasized even in the digital era.

  • PDF

A Study on Data Acquisition in the Invisible Zone of UAV through LTE Remote Control (LTE 원격관제를 통한 UAV의 비가시권 데이터 취득방안)

  • Jeong, HoHyun;Lee, Jaehee;Park, Seongjin
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.6_1
    • /
    • pp.987-997
    • /
    • 2019
  • Recently the demand for drones is rapidly increasing, as developing Unmanned Aerial Vehicle (UAV) and growing interest in them. Compared to traditional satellite and aerial imagery, it can be used for various researches (environment, geographic information, ocean observation, and remote sensing) because it can be managed with low operating costs and effective data acquisition. However, there is a disadvantage in that only a small area is acquired compared to the satellite and an aircraft, which is a traditional remote sensing method, depending on the battery capacity of the UAV, and the distance limit between Ground Control System (GCS) and UAV. If remote control at long range is possible, the possibility of using UAV in the field of remote sensing can be increased. Therefore, there is a need for a communication network system capable of controlling regardless of the distance between the UAV and the GCS. The distance between UAV and GCS can be transmitted and received using simple radio devices (RF 2.4 GHz, 915 MHz, 433 MHz), which is limited to around 2 km. If the UAV can be managed simultaneously by improving the operating environment of the UAV using a Long-Term Evolution (LTE) communication network, it can make greater effects by converging with the existing industries. In this study, we performed the maximum straight-line distance 6.1 km, the test area 2.2 ㎢, and the total flight distance 41.75 km based on GCS through LTE communication. In addition, we analyzed the possibility of disconnected communication through the base station of LTE communication.

The cancellation performance of loop-back signal in wireless USN multihop relay node (무선 USN 멀티홉 중계 노드에서 루프백 신호의 제거 성능)

  • Lim, Seung-Gag;Kang, Dae-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.17-24
    • /
    • 2009
  • This paper deals with the cancellation performance of loop back interference signal in the case of multihop relay of 16-QAM received signal at the USN radio network. For this, it is necessary to the exchange of information with long distance located station by means of the relay function between the node in the USN environment. In the relay node, the loop-back interference signal which the retransmitting signal is feedback to the receiver side due to the antenna of transmitter and receiver are co-used or very colsely located or using the nonlinear device. Due to this signal, the performance of USN system are degraded which are using the limited resource of frequency and power. For improve this, it is necessary to applying the adaptive signal processing algorithm in order to cancellating the unwanted loop-back interference signal at the frontend of receiver in relaying node, we can get the better system and multi hop performance. In the adaptive signal processing, we considered the 16-QAM signal which has a good spectral efficiency, firstly, than, the QR-Array RLS algorithm was used that has a fairly good convergence property and the solving the finite length problem in the H/W implementation. Finaly, we confirmed that the good elimination performanc was confirmed by computer simulation in the learing cuved and received signal constellation compared to the conventional RLS.

  • PDF

Real-Time Remote Display Technique based on Wireless Mobile Environments (무선 모바일 환경 기반의 실시간 원격 디스플레이 기법)

  • Seo, Jung-Hee;Park, Hung-Bog
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.297-302
    • /
    • 2008
  • In case of display a lot of information from mobile devices, those systems are being developed that display the information from mobile devices on remote devices such as TV using the mobile devices as remote controllers because it is difficult to display a lot of information on mobile devices due to their limited bandwidth and small screen sizes. A lot of cost is required to design and develop interfaces for these systems corresponding to each of remote display devices. In this paper, a mobile environment based remote display system for displays at real times is proposed for continuous monitoring of status data for unique 'Mote IDs'. Also, remote data are collected and monitored through sensor network devices such as ZigbeX by applying status perception based remote displays at real times through processing ubiquitous computing environment data, and remote display applications at real times are implemented through PDA wireless mobiles. The system proposed in this paper consists of a PDA for remote display and control, mote embedded applications programming for data collections and radio frequency, server modules to analyze and process collected data and virtual prototyping for monitoring and controls by virtual machines. The result of the implementations indicates that this system not only provides a good mobility from a human oriented viewpoint and a good usability of accesses to information but also transmits data efficiently.