• Title/Summary/Keyword: 이동통신 단말기

Search Result 825, Processing Time 0.029 seconds

Filter Size Determination Algorithms for Decision-Directed Channel Estimators in Wideband CDMA Mobile Communication Systems (광대역 CDMA이동통신 시스템의 결정지향 채널추정기를 위한 필터크기 결정 방법)

  • Rim, Min-Joong;Ryu, Chul;Ahn, Jae-Min
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.5
    • /
    • pp.171-180
    • /
    • 2003
  • CDMA(Code Division Multiple Access) mobile communication systems require accurate channel estimation in the receiver to compensate the fading distortions. Instantaneous channel estimates are obtained by dividing the received symbol by the transmitted symbol and then refined by filtering to reduce the estimation variance. In the channel estimation filter, the determination of the filter size is a very important task which greatly affects the estimation quality. While conventional methods usually use only velocity estimators to determine the channel estimation filter size, this paper proposes a filter size determination method for decision-directed channel estimators considering the symbol error rate and the signal-to-noise ratio in addition to the velocity of the mobile station. This paper shows that the symbol error rate and the signal-to-noise ratio are important factors for the determination of the channel estimation filter size.

Security Scheme for Prevent malicious Nodes in WiMAX Environment (WiMAX 환경에서 악의적 노드 예방을 위한 보안 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.382-389
    • /
    • 2009
  • As the use of mobile device is popularized, the needs of variable services of WiMAX technique and the importance of security is increasing. There is a problem that can be easily attacked from a malicious attack because the action is achieved connectionlessly between neighbor link establishing procedure and TEK exchange procedure in mobile WiMAX even though typical 1 hop network security technique is adapted to WiMAX for satisfying these security requirement. In this paper, security connected mechanism which safely connects neighbor link establishing procedure of WiMAX and TEK exchange procedure additional to the basic function provided by IEEE 802.16e standard to satisfy security requirement of mobile WiMAX is proposed. The proposed mechanism strengthens the function of security about SS and BS by application random number and private value which generated by SS and BS to public key of neighbor link establishing procedure and TEK exchange procedure. Also, we can prevent from inside attack like man-in-the-middle which can occur in the request of TEK through cryptographic connection of neighbor link establishing procedure and TEK exchange procedure.

Perfomance Evaluation of efficent handover Latency Using MIH Services in MIPv4 (MIH를 이용한 효율적인 MIPv4망의 구성에 관한 연구)

  • Kim, Ki-Yong;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.75-78
    • /
    • 2007
  • Mobile IP provides hand-held devices with mobility which allows the user to do work over the network. However, handover time due transfer between access routers causes network delays and data loss. L2Trigger Handover expects this handover to take place, and executes L3 handover before L2 handover takes place, thereby reducing overall handover latency, although it still is an issue since handover latency between AR is not completely eliminated in L2 trigger handover. In this paper took into consideration where MIH is used in MIPv4 and using MIH Table when handover is about to occur in MN(Mobile Node), thereby pre-fetching data needed by Handover. In this way, when the handover is estimated, it improves the init time that L2trigger had. Furthermore we can find that we can execute the handover with shorten init time in smaller and narrow overlap length

  • PDF

Design of Dual Half Wavelength Loaded Line Antenna for Multiband Mobile Handsets (다중 대역 이동 통신 단말기용 이중 반파장 로디드 라인 안테나 설계)

  • Park, Jin-Woo;Kim, Duk-Gu;Jung, Byung-Woon;Park, Myun-Joo;Cheong, Young-Seek;Lee, Byung-Je
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.3 s.118
    • /
    • pp.265-272
    • /
    • 2007
  • In this paper, a frequency changeable antenna using dual half wavelength loaded line structure is proposed for multiband mobile handset applications. The proposed antenna has a capability of independent frequency shift by controlling two added inductance values in two different bands. Experimental results indicate that the proposed antenna provides enough effective bandwidth to cover $CELLULAR(824\sim894\;MHz)$, $EGSM(880\sim960\;MHz)$, $DCS1800(1,710\sim1,880\;MHz)$, $PCS1900(1,850\sim1,990\;MHz)$ and $WCDMA(1,920\sim2,170\;MHz)$ bands and peak gain variation is only 0.54 dB.

An Efficient Cooperative Diversity Scheme for Mobile Satellite Broadcasting Services (휴대형 이동위성방송 서비스를 위한 효율적인 협동 다이버시터 기법)

  • Kim, Soo-Young;Kim, Hee-Wook;Park, Un-Hee;Ahn, Do-Seob
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3A
    • /
    • pp.258-264
    • /
    • 2009
  • In this paper, we propose an efficient cooperative diversity scheme for mobile satellite multimedia broadcasting services. The proposed scheme is a transmit diversity technique to adapt time varying channel conditions, and we do not need any channel quality information from the return link. In the proposed scheme, we utilize space-time block coding (STBC) and rate compatible turbo codes in order to realize the transmit diversity for the mobile satellite system with several repeaters. The satellite and several repeaters operate in unison to send the encoded signals, so that the receiver may realize diversity gain. The simulation results demonstrate that the proposed scheme can provide highly improved performance.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Algorithm Development for Extract O/D of Air Passenger via Mobile Telecommunication Bigdata (모바일 통신 빅데이터 기반 항공교통이용자 O/D 추출 알고리즘 연구)

  • Bumchul Cho;Kihun Kwon
    • The Journal of Bigdata
    • /
    • v.8 no.2
    • /
    • pp.1-13
    • /
    • 2023
  • Current analysis of air passengers mainly relies on statistical methods, but there are limitations in analyzing detailed aspects such as travel routes, number of regional passengers and airport access times. However, with the advancement of big data technology and revised three data acts, big data-based transportation analysis has become more active. Mobile communication data, which can precisely track the location of mobile phone terminals, can serve as valuable analytical data for transportation analysis. In this paper, we propose a air passenger Origin/Destination (O/D) extraction algorithm based on mobile communication data that overcomes the limitations of existing air transportation user analysis methods. The algorithm involves setting airport signal detection zones at each airport and extracting air passenger based on their base station connection history within these zones. By analyzing the base station connection data along the passenger's origin-destination paths, we estimate the entire travel route. For this paper, we extracted O/D information for both domestic and international air passengers at all domestic airports from January 2019 to December 2020. To compensate for errors caused by mobile communication service provider market shares, we applied a adjustment to correct the travel volume at a nationwide citizen level. Furthermore correlation analysis was performed on O/D data and aviation statistics data for air traffic users based on mobile communication data to verify the extracted data. Through this, there is a difference in the total amount (4.1 for domestic and 4.6 for international), but the correlation is high at 0.99, which is judged to be useful. The proposed algorithm in this paper enables a comprehensive and detailed analysis of air transportation users' travel behavior, regional/age group ratios, and can be utilized in various fields such as formulating airport-related policies and conducting regional market analysis.

Implementation of Realtime B2B System using Mobile Terminal (모바일 단말기를 이용한 실시간 B2B 시스템 구현)

  • Lee Hyae-Jung;Joung Suck-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.1-6
    • /
    • 2006
  • Previous to do business computerization of industry field, it isn't efficient for write down all account book. Recently many companies competitive is raised from competence improvement for a task and cost-cutting for electronic data processing system. Moreover, sudden increase of internet-user need effective management information system and share information because of network connection. Accordingly, it needs to get out of text base information system from multimedia base system and it need to introduce E-catalog system of merchandise information. In addition, it is required technological development and merchandising with movement, real time omnipresent. carrying. In this paper, established portable B2B system with movement of precious metals and jewels field's portable terminal from mobile technology.

Design of Electromagnetic Band Gap Structure for Global Navigation Satellite Service (Global-Navigation Satellite Service를 위한 Electromagnetic Band Gap 구조체 설계)

  • Chung, Ki-Hyun;Jang, Young-Jin;Yeo, Sung-Dae;Jung, Chang-Won;Kim, Seong-Kweon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.1
    • /
    • pp.27-32
    • /
    • 2015
  • In this paper, a mushroom typed electromagnetic band gap (EBG) structure to be inserted in the printed circuit board (PCB) inner layer in order to stabilize the PCB power line is proposed for global-navigation satellite service (GNSS). In designing the proposed EBG structure, the target stop-bandwidth was designed from 1.55GHz to 1.81GHz including GNSS and mobile communication-related frequency bandwidth. In this bandwidth, the insertion loss(S21) was observed below about -40dB. From the simulation results, it is expected that the stabilization of power delivery network (PDN) structure in the PCB circuit design should be improved and the effective correspondence to EMI will be helpful.

A Study on the Improvement of MIMO Antenna Isolation for Mobile Applications (휴대 단말기용 MIMO 안테나의 격리도 향상에 관한 연구)

  • Yoon, In-Seop;Yan, Xiao-Jia;Kim, Sang-Uk;Jo, Yun-Hyun;Park, Hyo-Dal
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.9
    • /
    • pp.987-992
    • /
    • 2015
  • In this paper, neutralization line structure have been employed to improve the isolation between the MIMO antenna system. The proposed MIMO antenna size is $116mm{\times}64mm{\times}5mm$ and designed on FR-4(${\varepsilon}r=4.4$) ground substrate. Neutralization line was applied to enhance isolation between the each antenna elements. The fabricated antenna satisfied a VSWR below 3 in LTE band B13 and the isolation between the MIMO antenna system is presented below -15dB. On the H-plane, antenna shows an omnidirectional pattern. In LTE band B13, the antenna presents a gain of a -2.6dBi ~-1.18dBi and radiation efficiency of 33.49% ~ 46.45%. Comparing measurement result with the outcome of simulation, the proposed MIMO antenna is expected to be applied for mobile application.