• Title/Summary/Keyword: Access Network Design

Search Result 690, Processing Time 0.027 seconds

Design of u-Transportation Communication Systems for Next-Generation ITS Services (차세대 ITS 서비스를 위한 u-Transportation 통신시스템 설계)

  • Song, Jung-Hoon;Lee, Jae-Jeong;Kim, Seong-Ryul;Kim, Jung-Joon;Seo, Dae-Wha
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.5
    • /
    • pp.61-72
    • /
    • 2013
  • Next-generation ITS(Intelligent Transportation System) adopts WAVE(Wireless Access in Vehicular Environment) system which is capable of the bidirectional communication system in vehicular environments. u-Transportation system adopted WAVE communications system to show the optimal performance in terms of various services with regard to vehicle safety and traffic. In this paper, we introduce testbed of ubiquitous-Transportation system and its service. Then, we describe WAVE system for supporting next-generation ITS service. Also, we carried out tests in real road environments in order to verify communication functions of WAVE systems and its performance. We confirmed that our communication systems for supporting services meet the communication performance.

Role of Online Social Decision When Purchasing NP : The Moderating Effect of NP Innovation (신제품 구매시 온라인 사회적 결정 역할 : 신제품 혁신성 조절효과)

  • Han, Sang-Seol
    • Journal of Distribution Science
    • /
    • v.16 no.7
    • /
    • pp.57-65
    • /
    • 2018
  • Purpose - Recently, internet access and social network utilization using smart phone are increasing. In such a smart environment, interactive activities such as information generation, information searching and information sending are increasing rapidly on-line environment. Therefore, consumers tend to purchase something according to eWOM and also meet the social consensus online environment. In connectivity society, consumers became accessible and engaged in the opinions of others easily. Many decisions that seem like personal decisions are actually social decisions on online connectivity. This paper seeks to explore factors that can help generate a social decision on purchasing of new products in an online environment. Research design, data, and methodology - The process of collecting a lot of wisdom and making an agreement online is called social decision. The purpose of this paper is to examine empirically the influence of factors such as online ties, online eWOM expectancy and online information behavior on online social decision. In addition, We studied online social decision by analyzing the moderating effect of new product innovation. To understand this structural relationship, research hypotheses and research models were set up and empirical analysis was conducted. In order to verify the hypothesis, 208 questionnaires were collected from the residents of Seoul city/Gyeonggi province. The answered questionnaire verifies reliability and validity using SPSS/AMOS and test hypotheses through path analysis and multiple regression analysis. Results - According to the research results, First, online ties don't have a positive impact on online social decision, Second, online eWOM expectancy have a positive impact on online social decision. Third, online information behaviors have a positive impact on online social decision. The degree of innovation of new products have a moderating effect between Independent variables of three factors and dependent variable of social decision. Conclusions - Social decisions have a positive impact on purchasing decisions about new product. There is a great significance in the fact that the online social influence and online social decision have been studied academically. It is meaningful that we have studied in depth the changing phenomenon of consumer purchase decision process in smart environment. The results of these studies provide academic and practical implications.

A Design of a Personnel Control System Using UHF-RFID in Shipping (UHF 대역 RFID를 이용한 선박내 인원관리 시스템 설계)

  • Cha, Jin-Man;Kim, Myeung-Hwan;Park, Yeoun-Sik;Seong, Gil-Yeong;Lee, Sang-Uk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.832-835
    • /
    • 2008
  • An information-oriented basis in today's society has been changing fast, and the desire for connectivity has caused an exponential growth in wireless communication and sensor network. Sensor networks using RFID, in particular, have led this trend due to the increasing exchange of data in Ubiquitous such as the home RF, access control system, U-Healthcare, and Logistics information Systems. Also, the RFID when it applies a technique, is able to raise the stability of shipping as controling the mobile course and an entrance and exit of the crews an well as previously preventing an accident from shipping. In this paper, we designed and implemented personnel control system using UHF-RFID in vessels which shows through host PC reading and writing tag.

  • PDF

Design and Implementation of Sensor based Intrusion Detection System (센서 기반 침입 탐지 시스템의 설계와 구현)

  • Choi, Jong-Moo;Cho, Seong-Je
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.865-874
    • /
    • 2005
  • The information stored in the computer system needs to be protected from unauthorized access, malicious destruction or alteration and accidental inconsistency. In this paper, we propose an intrusion detection system based on sensor concept for defecting and preventing malicious attacks We use software sensor objects which consist of sensor file for each important directory and sensor data for each secret file. Every sensor object is a sort of trap against the attack and it's touch tan be considered as an intrusion. The proposed system is a new challenge of setting up traps against most interception threats that try to copy or read illicitly programs or data. We have implemented the proposed system on the Linux operating system using loadable kernel module technique. The proposed system combines host~based detection approach and network-based one to achieve reasonably complete coverage, which makes it possible to detect unknown interception threats.

A Design of Permission Management System Based on Group Key in Hadoop Distributed File System (하둡 분산 파일 시스템에서 그룹키 기반 Permission Management 시스템 설계)

  • Kim, Hyungjoo;Kang, Jungho;You, Hanna;Jun, Moonseog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.141-146
    • /
    • 2015
  • Data have been increased enormously due to the development of IT technology such as recent smart equipments, social network services and streaming services. To meet these environments the technologies that can treat mass data have received attention, and the typical one is Hadoop. Hadoop is on the basis of open source, and it has been designed to be used at general purpose computers on the basis of Linux. To initial Hadoop nearly no security was introduced, but as the number of users increased data that need security increased and there appeared new version that introduced Kerberos and Token system in 2009. But in this method there was a problem that only one secret key can be used and access permission to blocks cannot be authenticated to each user, and there were weak points that replay attack and spoofing attack were possible. Hence, to supplement these weak points and to maintain efficiency a protocol on the basis of group key, in which users are authenticated in logical group and then this is reflected to token, is proposed in this paper. The result shows that it has solved the weak points and there is no big overhead in terms of efficiency.

Resource Allocation in Full-Duplex OFDMA Networks: Approaches for Full and Limited CSIs

  • Nam, Changwon;Joo, Changhee;Yoon, Sung-Guk;Bahk, Saewoong
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.913-925
    • /
    • 2016
  • In-band wireless full-duplex is a promising technology that enables a wireless node to transmit and receive at the same time on the same frequency band. Due to the complexity of self-interference cancellation techniques, only base stations (BSs) are expected to be full-duplex capable while user terminals remain as legacy half-duplex nodes in the near future. In this case, two different nodes share a single subchannel, one for uplink and the other for downlink, which causes inter-node interference between them. In this paper, we investigate the joint problem of subchannel assignment and power allocation in a single-cell full-duplex orthogonal frequency division multiple access (OFDMA) network considering the inter-node interference. Specifically, we consider two different scenarios: i) The BS knows full channel state information (CSI), and ii) the BS obtains limited CSI through channel feedbacks from nodes. In the full CSI scenario, we design sequential resource allocation algorithms which assign subchannels first to uplink nodes and then to downlink nodes or vice versa. In the limited CSI scenario, we identify the overhead for channel measurement and feedback in full-duplex networks. Then we propose a novel resource allocation scheme where downlink nodes estimate inter-node interference with low complexity. Through simulation, we evaluate our approaches for full and limited CSIs under various scenarios and identify full-duplex gains in various practical scenarios.

Concept Design of Download Over-the-Air functions for IoF-Cloud based distributed IoT device (IoF-Cloud 기반 분산된 IoT 장비들을 위한 Download Over-the-Air 기능의 개념 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, HyeongGyun;Kim, YongIl;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.9-17
    • /
    • 2016
  • Over the next 20 years it will begin the exodus from the Internet and smart phones to the Internet of Things. The heart of IoT gives new utility and value with connectivity among things around people to the human. In future, Industrial environment will be intimately connect all among machines and machines or factories and factories in all processing, and by digitizing of all goods and production life-cycle, which is a combination of virtual world and real world, the digital factory will become reality eventually. The proposed IoT or IIoT based Download OTA (Over-the-Air) provides a flexible mechanism for downloading Media objects of any type and size from a network. Moreover, proposed IoT based DLOTA provides a part of security by lightweight encryption, OTP, and CapBAC technique.

The Improvements for 3GPP LTE-Advanced Relay (3GPP LTE-Advanced을 위한 Relay 개선 방안)

  • Park, Byoung-Seong;Kim, Sang-Ha;Chang, Il-Doo;Lee, Hee-Bong;Kwon, Kyoung-In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1647-1658
    • /
    • 2011
  • This paper suggests the methods to improve the wireless backhaul link of the Relay FDD mode that 3GPP LTE-Advanced supports. New RRC message and Relay startsup procedure are introduced to apply Carrier Aggregation in the Relay wireless backhaul. Also, we design new reference signal that makes Type 1 Relay operated in full-duplexing, expecting to maximize the radio resource utilization. And, we propose the efficient configuration for the periodic uplink control information under the backhaul subframe allocation method in LTE-Advanced Relay. Hereafter, the standard activities in the 3GPP RAN is supposed to focus on the improvement of the LTE-Advanced features. Therefore, the suggestions in this paper are expected to be actively discussed in the LTE-Advanced future releases.

Control Frame Design for Improvement Transmit Efficiency in the Wireless Networks (무선 네트워크에서 전송효율증대를 위한 제어프레임 설계)

  • Han, Jae-Kyun;Pyeon, Seok-Beom
    • 전자공학회논문지 IE
    • /
    • v.48 no.2
    • /
    • pp.61-70
    • /
    • 2011
  • IEEE 802.11 wireless network supports control frames like RTS/CTS(Request To Send / Clear To Send). Because they is defend to frame collection problems. It helps to solve the frame collection problem but decreases the throughput rate. Also, control frame makes False Node Problem. This problem is makes to other wireless nodes don't work and don't find channels in the same cell and near cells. We proposed a reformed new control frame for efficiency throughput rate and solution of False Node Problem. New control frame is to have added to 4 bytes of channel detection ability at the RTS frames. Channel detection ability supported to check channel at the wireless node start to transmit data frame, We expect that channel detection ability make prevent False Node Problem for increase to access number to channel. We perform comparative analysis in terms of delay(sec) and load(bits/sec) with reform RTS/CTS method which proves the efficiency of the proposed method.

Design and Fabrication of Monopole Antenna with Three Branch Strips and Rectangular Slit Ground for WLAN/WiMAX Applications (무선랜과 와이맥스 시스템에 적용 가능한 브랜치 라인과 사각 슬릿 접지를 갖는 모노폴 안테나 설계와 제작)

  • Koo, Yung-Seo;Yoon, Joong-Han
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.611-620
    • /
    • 2011
  • A planar monopole antenna that was developed for WLAN/WiMAX application is presented in this paper. The proposed antenna with three strips, an asymmetrical ground plane, and a rectangular slit in the ground is designed to cover the popular frequency spectrum of WLAN (wireless local area network) bands and WiMAX (Worldwide Interoperability for Microwave Access) bands. The proposed antenna, which is capable of wideband operation, is fed by a strip line and fabricated on an FR-4 substrate. The obtained numerical results agree well with the experiment data. It was validated that the configuration can meet the demands for the WLAN/WiMAX systems and effectively enhanced the impedance bandwidth to 9.95% for the lower band and 76.05% for the upper band for VSWR < 1 : 2. This paper also presents and discusses the 2D radiation patterns and 3D gains according to the results of the experiment.