• Title/Summary/Keyword: Bluetooth host and client

Search Result 4, Processing Time 0.025 seconds

Robotic Agent Design and Application in the Ubiquitous Intelligent Space (유비쿼터스 지능형 공간에서의 로봇 에이전트 설계 및 응용)

  • Yoon Han-Ul;Hwang Se-Hee;Kim Dae-Wook;Lee Doong-Hoon;Sim Kwee-Bo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.12
    • /
    • pp.1039-1044
    • /
    • 2005
  • This paper presents a robotic agent design and application in the ubiquitous intelligent space. We set up an experimental environment with Bluetooth host, Bluetooth client, furniture and home appliance, and robotic agents. First, the agents basically performed patrol guard to detect unexpected penetration, and to keep home safely from gas-leakage, electric leakage, and so on. They were out to patrol fur a robbery while navigating in a living room and a private room. In this task, we used an area-based action making and a hexagon-based Q-learning to control the agents. Second, the agents communicate with Bluetooth host device to access and control a home appliance. The Bluetooth host offers a manual control to person by inquiring a client robot when one would like to check some place especially. In this exercise, we organize asynchronous connection less (ACL) between the host and the client robots and control the robot maneuver by Bluetooth host controller interface (HCI).

Implementation Of Moving Picture Transfer System Using Bluetooth (Bluetooth를 이용한 동영상 전송 시스템 구현)

  • 조경연;이승은;최종찬
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.25-28
    • /
    • 2001
  • In this paper we implement moving picture transfer system using bluetooth Development Kit (DK). To reduce the size of the image data, we use M-JPEG compression. We use bluetooth Synchronous Connection-Oriented (SCO) link to transfer voice data. Server receive image data from camera and compress the image data in M-JPEG format, and then transmit the image data to client using bluetooth Asynchronous connection-less (ACL) link. Client receive image data from bluetooth ACL link and decode the compressed image and then display the image to screen. Sever and Client can transmit and receive voice data simultaneously using bluetooth SCO link. In this paper bluetooth HCI commands and events generated by host controller to return the results of HCI commands are explained and the flow of bluetooth connection procedure is presented.

  • PDF

Implementation of homenetwork Middleware-System Based on Bluetooth Interface (블루투스 인터페이스를 이용한 홈네트워크 미들웨어시스템 구현)

  • 이진우;박용진;김원태
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.340-342
    • /
    • 2001
  • 본 논문에서는 홈네트워크에서 반드시 필요하게될 무선데이타통신 전송기술로서 블루투스 인터페이스의 상위 프로토콜 스택중 소프트웨어와 관련된 HCI(Host Controller Interface), L2CAP(Logical Link Control and Adaptation Protocol), SDP(Service Discovery Protocol)레이어에 관해 정의를 하고, 홈네트워크 미들웨어로서 자바를 기반으로한 Jini 시스템의 서비스제공자(services) 서비스관리자(Lookup service), 서비스이용자(client)간의 통신 구조에 대해 살펴본다. 블루투스 인터페이스를 이용한 Jini 시스템에서 client에 PDA, service로는 프린터로 구성하여 이에 기반한 여러 프로토콜의 사용을 설명하고 현재 SA-1110 보드상의 Jini 시스템을 구현중인 모델의 구성과 원격제어를 위한 향후 확장계획에 대해 간단하게 소개한다.

Design of Embedded Security Controller Based on Client Authentication Utilizing User Movement Information (사용자의 이동정보를 활용한 클라이언트 인증 기반의 임베디드 보안 컨트롤러 설계)

  • Hong, Suk-Won
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.163-169
    • /
    • 2020
  • A smart key has been used in a variety of embedded environments and there also have been attacks from a remote place by amplifying signals at a location of a user. Existing studies on defence techniques suggest multiple sensors and hash functions to improve authentication speed; these, however, increase the electricity usage and the probability of type 1 error. For these reasons, I suggest an embedded security controller based on client authentication and user movement information improving the authentication method between a controller and a host device. I applied encryption algorithm to the suggested model for communication using an Arduino board, GPS, and Bluetooth and performed authentication through path analysis utilizing user movement information for the authentication. I found that the change in usability was nonsignificant when performing actions using the suggested model by evaluating the time to encode and decode. The embedded security controller in the model can be applied to the system of a remote controller for a two-wheeled vehicle or a mobile and stationary host device; in the process of studying, I found that encryption and decryption could take less then 100ms. The later study may deal with protocols to speed up the data communication including encryption and decryption and the path data management.