• Title/Summary/Keyword: Conference Server

Search Result 2,088, Processing Time 0.028 seconds

CDMA Band Dual-fed ICS Repeater Antenna with High Isolation (CDMA 대역 고격리 이중급전 ICS 중계기 안테나)

  • Kim, GunKyun;Lee, Jong-Ig;Ko, Jin-hyun;Rhee, Seung-Yeop
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.75-76
    • /
    • 2016
  • Even if ICS(Interference Cancellation System) repeater is used in wireless communication system, it has the disadvantage that it must have enough distance between Donor and Service antenna to be isolated. In this paper, new ICS repeater integrated antenna with high insolation characteristics is designed. The proposed antenna is fabricated for 800MHz and measured. Bandwidth and gain are optimized by changing the stub lengths near main patch and power divider, and also by changing the size of parasitic patch. This antenna has a return loss less than -13 dB, a gain over 3 dBi, and an isolation between the donor and the server antennas less than -56 dB from 824~894 MHz for CDMA mobile communication. Therefore, the proposed antenna structure can be applied to eliminate the shadow area and to expand the coverage area for any other wireless communication bands.

  • PDF

An Investigation into the Applicability of Node.js as a Platform for implementing Mobile Web Apps. (모바일 웹 어플리케이션을 구현하기 위한 Node.js 파일에 대한 조사)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.286-289
    • /
    • 2016
  • In this paper, we propose an architecture that affords mobile app based on nomadic smartphone using not only mobile cloud computing- architecture but also a dedicated web platform called Node.js built-in with the asynchronous, Nonblocking, Event-Driven programming paradigm. Furthermore, the design of the proposed architecture takes document oriented database known as MongoDB to deal with the large amount of data transmit by users of mobile web access application. The Node.js aims to give the programmers the tools needed to solves the large number of concurrent connections problem. We demonstrate the effectiveness of the proposed architecture by implementing an android application responsible of real time analysis by using a vehicle to applications smart phones interface approach that considers the smartphones to acts as a remote users which passes driver inputs and delivers output from external applications.

  • PDF

A Study on Data Movement Method between For for Cloud Computing (클라우드를 위한 포그 간의 데이터 이동 기법에 관한 연구)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo;Lee, Hae-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.294-296
    • /
    • 2017
  • Cloud computing is a computing technique that uploads all the data from a cloud node to a cloud server and provides it to users as a service. This is difficult to provide services in real time depending on the network conditions. This is because it is necessary to download information to the remote site through the network, not the local area, and to download additional services to provide services in the cloud. So fog computing has been proposed as an alternative. In this paper, we propose an efficient data exchange technique between cloud, fog and user. The proposed fog provides services to users and collects and processes data. The cloud is responsible for the flow of data exchange and control between the fog. We propose a standard method for data exchange. The application for this is to process and service the information generated by the BAN (Body Area Network) in the fog, and the cloud serves as a mediator. This can resolve data heterogeneity between devices or services and provide efficient data movement.

  • PDF

Study on IoT Controller for Smart Home Service (스마트홈 서비스를 위한 사물인터넷 컨트롤러에 관한 연구)

  • Kwon, Dong-hyun;Lim, Ji-yong;Heo, Sung-uk;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.590-591
    • /
    • 2017
  • In the existing smart home, a separate platform was set up for each manufacturer to provide services through terminals. However, due to the development of Internet technology, various Internet devices and services have been launched, and there is a limit to the existing closed platforms for each manufacturer. Therefore, in this paper, we propose an object internet controller that integrates control of Internet devices in a smart home environment and provides various services through IFTTT. The proposed Internet controller is connected to the server via WiFi, and can control the Internet device and service of objects through the button input event. In addition, we expect to be able to provide a service environment that can create various smart home services by registering DIY products through open platform of oneM2M standard method.

  • PDF

Risk Management and Telecommunications Research for customers of the accident location (사고선박의 고객위치파악용 위험관리 통신연구)

  • Kwak, Eun-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.331-335
    • /
    • 2016
  • When a boating accident, such as a January number three, the customer's risk management issues emerged. Ships and accident risk in confined spaces such as risk management to locate the customer and dangers of probation is available. In this paper, aboard after consent to obtain information for customers to wrist to customers, webbing or portable device embedded in devices and Wireless sensor information Input was attached, disposable consumer information. Customer on board the ship setting for location analysis and positioning according to information communication protocol, ships, each customer's real-time location information on the screen, 3 the foundation of d customers on the floor Can be designed to inform. Threshold designed to reduce the error of the information to analyze the position in current position and errors. Also, to system attacks would control the situation of accident and emergency jaenanguk server with real-time information transmission of information outside the emergency during a disaster, search and Disaster relief to be possible.

  • PDF

IoT Sensor Data Identification based Automation System (IoT 센서 데이터 식별 기반 자동화 시스템)

  • Yu, Donggyun;Kim, Hoyoung;Kim, Jinsung;Im, Seongmin;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.615-616
    • /
    • 2017
  • Recently, research are being conducted to provide an automated environment utilizing various sensors in a place where management is use. However, in an existing automation system environment because the measured sensor data is processed in a batch in the server, than the currently action task there arises a problem that a conflict occurs between task when a task that should operate preferentially occurs. In this paper, we propose a system that provides automation using Sensor Data Identification Algorithm to solve these problems. The algorithm distinguishes between real-time and non-real-time tasks and automatically control tasks what happens after priority is applied. Through this, it is expected that it can reduce manager intervention and reduce unnecessary work operation and power consumption and construct an efficient automation environment.

  • PDF

Design of Digital-clothing that can Detect Driver's Bio-signal and Position (운전자의 생체신호 및 위치 파악이 가능한 디지털 의류 설계)

  • Lee, Min-hye;Jeong, Dong-myong;Shin, Seong-yoon;Jeon, Tae-il;Choi, Jae-seok;Jeong, Gi-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.171-173
    • /
    • 2018
  • The poor working conditions of transit drivers not only lead to mental stress and fatigue accumulation of workers, but also to the main causes of mass transit accidents. Stress and fatigue accumulation are closely related to the vital signs because they affect the psychological and physical health. In this paper, we designed a digital garment which can measure driver's health condition by measuring electrocardiogram, pulse rate and body temperature. Also proposed a system that transmits the measured bio-signal to the smartphone app via Bluetooth and transmits the current position of the driver to the server by using the built-in GPS of the smartphone, assuming there is something wrong.

  • PDF

A Study of node Authentication in Ad-hoc Network using Java Card (자바 카드를 이용한 Ad-hoc망의 노드 인증에 관한 연구)

  • Lee, Cheol-Seung;Shin, Myeong-Sook;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.902-905
    • /
    • 2005
  • In this paper we challenge the mobile node Authentication using Java Card authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc rooting protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Java Card Authentication of mobile node can possibly be applied to the area of M-Commerce, Wireless Security, and Ubiquitous Computing and so on.

  • PDF

Design of the Certificate-based Authorization Policy Module in a PKI Environment (PKI 환경에서 인증서 기반 권한 정책 모듈 설계)

  • Shin, Myeong-Sook;Song, Gi-Beom;Lee, Jeong-Gi;Lee, Cheol-Seung;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.898-901
    • /
    • 2005
  • In this paper, we design an authorization policy module which provides the safty and reliable authorization of the user to provide the resolution for authorization in distributed environments. PKI have been utilized much by an information security-based structure for Internet electronic commerce, it is developing X.509-based in various application field such as a network security. Especially, it provides good resolution for the authentication of the user in the situation not to meet each other, but it is not enough to provide the resolution of the authorization in distributed computing environments. In this paper, We provide AAS model, which can be used distributed resources by distributed users, and design AAS model which is an authorization policy module in the Linux-based Apache Web server.

  • PDF

Real time Monitoring System using Web Camera (웹 카메라를 통한 실시간 모니터링 시스템)

  • Ryu, Kwang-Hee;Choi, Jong-Kun;Im, Young-Tae;Park, Yeon-Sik;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.667-670
    • /
    • 2005
  • As security and surveillance have become the center of interest, remote controlled CCTV(Closed-Circuit Television) market has been formed while rapid development of digital image compression technology and Internet triggered the advent of web cameras. The characteristic of web camera is that it can provide users with higher quality image than CCTV at any place where Internet access is available. However, As for the system administrator, the existing web camera have disadvantage in that they allows users only. who are connected to the server of the web camera, to see the image from it. In this paper, in order to make up for this defect, designed multi-vision interface showing multi images on single screen and, for the purpose of the improvement in efficiency, the functions of saving images and of scheduling the time to save the images.

  • PDF