• Title/Summary/Keyword: 유/무선통신

Search Result 375, Processing Time 0.021 seconds

Bicycle Riding-State Recognition Using 3-Axis Accelerometer (3축 가속도센서를 이용한 자전거의 주행 상황 인식 기술 개발)

  • Choi, Jung-Hwan;Yang, Yoon-Seok;Ru, Mun-Ho
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.6
    • /
    • pp.63-70
    • /
    • 2011
  • A bicycle is different from vehicles in the structure that a rider is fully exposed to the surrounding environment. Therefore, it needs to make use of prior information about local weather, air quality, trail road condition. Moreover, since it depends on human power for moving, it should acquire route property such as hill slope, winding, and road surface to improve its efficiency in everyday use. Recent mobile applications which are to be used during bicycle riding let us aware of the necessity of development of intelligent bicycles. This study aims to develop a riding state (up-hill, down-hill, accelerating, braking) recognition algorithm using a low-power wrist watch type embedded system which has 3-axis accelerometer and wireless communication capability. The developed algorithm was applied to 19 experimental riding data and showed more than 95% of correct recognition over 83.3% of the total dataset. The altitude and temperature sensor also in the embedded system mounted on the bicycle is being used to improve the accuracy of the algorithm. The developed riding state recognition algorithm is expected to be a platform technology for intelligent bicycle interface system.

Developing Mobile GIS Spatial Data Compression Method for Forest Fire Extinguishment Information Management (산불진화정보 관리를 위한 Mobile GIS 공간 데이터 압축기법 개발)

  • Jo, Myung-Hee;Lee, Myung-Bo;Lee, Si-Young;Kim, Joon-Bum;Kwon, Bong-Kyum;Heo, Young-Jin
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.7 no.2
    • /
    • pp.78-86
    • /
    • 2004
  • Recently GPS and mobile GIS technologies based on LBS(location based service) have played an important role as DSS(decision supporting system) for domestic forest fire extinguishment policies. In this study forest fire extinguishments information management system based on mobile GIS technique was designed to seize the exact location on wireless network so that it helps to guide the safe and efficient extinguishments affairs and provide the extinguishments environment toward ground fighting teams and the central forest government in real time. Moreover, possibly to operate this system, the foundation technologies by the name of '.gci' such as the spatial data compression method, the spatial data transmission method over wireless network and the spatial analysis interface on PDA should be mainly considered. Especially, in this study the spatial data compression method having high compression rate from 51% to 62% for each polygon, line, and point data, without the loss of data was developed.

  • PDF

A Time-Parameterized Data-Centric Storage Method for Storage Utilization and Energy Efficiency in Sensor Networks (센서 네트워크에서 저장 공간의 활용성과 에너지 효율성을 위한 시간 매개변수 기반의 데이타 중심 저장 기법)

  • Park, Yong-Hun;Yoon, Jong-Hyun;Seo, Bong-Min;Kim, June;Yoo, Jae-Soo
    • Journal of KIISE:Databases
    • /
    • v.36 no.2
    • /
    • pp.99-111
    • /
    • 2009
  • In wireless sensor networks, various schemes have been proposed to store and process sensed data efficiently. A Data-Centric Storage(DCS) scheme assigns distributed data regions to sensors and stores sensed data to the sensor which is responsible for the data region overlapping the data. The DCS schemes have been proposed to reduce the communication cost for transmitting data and process exact queries and range queries efficiently. Recently, KDDCS that readjusts the distributed data regions dynamically to sensors based on K-D tree was proposed to overcome the storage hot-spots. However, the existing DCS schemes including KDDCS suffer from Query Hot-Spots that are formed if the query regions are not uniformly distributed. As a result, it causes reducing the life time of the sensor network. In this paper, we propose a new DCS scheme, called TPDCS(Time-Parameterized DCS), that avoids the problems of storage hot-spots and query hot-spots. To decentralize the skewed. data and queries, the data regions are assigned by a time dimension as well as data dimensions in our proposed scheme. Therefore, TPDCS extends the life time of sensor networks. It is shown through various experiments that our scheme outperform the existing schemes.

A Study on the Analysis of R&D Trends and the Development Plan of Electronic Attack System (전자공격체계 연구개발 동향 분석과 발전방안에 대한 연구)

  • Sim, Jaeseong;Park, Byoung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.469-476
    • /
    • 2021
  • An electronic attack (EA) system is an essential weapon system for performing electronic warfare missions that contain signal tracking and jamming against multiple threats using electromagnetic waves, such as air defense radars, wireless command and communication networks, and guided missiles. The combat effectiveness can be maximized, and the survivability of militarily protecting combat power can be enhanced through EA mission operations, such as disabling the functions of multiple threats. The EA system can be used as a radio frequency jamming system to respond to drone attacks on the core infrastructure, such as airports, power plants, and communication broadcasting systems, in the civilian field. This study examined the criteria for classification according to the electronic attack missions of foreign EA systems based on an aviation platform. The foreign R&D trends by those criteria were investigated. Moreover, by analyzing the R&D trends of domestic EA systems and future battlefields in the domestic security environments, this paper proposes technological development plans of EA systems suitable for the future battlefield environments compared to the foreign R&D trends.

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.