• Title/Summary/Keyword: Data Transmission Processing

Search Result 901, Processing Time 0.024 seconds

The Status of Configuration on the e-VLBI Network for the Transfer of Mass VLBI Data (대용량 VLBI 데이터 전송을 위한 e-VLBI 네트워크 구축 현황)

  • Song, Min-Gyu;Kim, Hyun-Goo;Byun, Do-Young;Roh, Duk-Gyoo;Oh, Se-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.560-562
    • /
    • 2005
  • The electronic transmission of VLBI data(dubbed e-VLBI) presents a special challenge to the use of high-speed global network. with long-term requirements for simultaneous or near-simultaneous Gbps data streams from antennas worldwide converging in a single processing center, e-VLBI is both a useful and highly synergetic application for global high-speed networksAs broband access to high speed research and education networks has become increasingly available to radio telescopes around the world the use of e-VLBI has also increased. High bandwidth e-VLBI experiments have been achieved across wide areas e-VLBI has also been used for the transfer of data from "production"exoeriments

  • PDF

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

An Intelligent Machine Learning Inspired Optimization Algorithm to Enhance Secured Data Transmission in IoT Cloud Ecosystem

  • Ankam, Sreejyothsna;Reddy, N.Sudhakar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.83-90
    • /
    • 2022
  • Traditional Cloud Computing would be unable to safely host IoT data due to its high latency as the number of IoT sensors and physical devices accommodated on the Internet grows by the day. Because of the difficulty of processing all IoT large data on Cloud facilities, there hasn't been enough research done on automating the security of all components in the IoT-Cloud ecosystem that deal with big data and real-time jobs. It's difficult, for example, to build an automatic, secure data transfer from the IoT layer to the cloud layer, which incorporates a large number of scattered devices. Addressing this issue this article presents an intelligent algorithm that deals with enhancing security aspects in IoT cloud ecosystem using butterfly optimization algorithm.

A Data Broadcasting System for Traffic Information Based on Terrestrial DMB (지상파 DMB에서 교통정보 제공을 위한 데이터방송시스템)

  • Kang, Do-Young;Yeh, Hong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.5
    • /
    • pp.300-311
    • /
    • 2006
  • Traffic information is considered as one of the core contents of the terrestrial DMB. This paper proposes and implements the data broadcasting system, which automatically collects data and transmits the contents in order to provide traffic information promptly The proposed data broadcasting system comprises the following three subsystems: 1 he traffic information integration system for collecting and processing data in real-time, the traffic information authoring system for automatically creating and verifying the contents, and the traffic information transmission system for transmitting the created contents. We describe these subsystems in detail about their functionality, components and interoperability. The proposed data broadcasting system provides the HWS type contents as the PAD data of the terrestrial DMB audio broadcast. Finally, we describe our implementation of the data broadcasting system, and suggest further improvements that need to be made.

Development of Tele-image Processing Algorithm for Automatic Harvesting of House Melon (하우스멜론 수확자동화를 위한 원격영상 처리알고리즘 개발)

  • Kim, S.C.;Im, D.H.;Chung, S.C.;Hwang, H.
    • Journal of Biosystems Engineering
    • /
    • v.33 no.3
    • /
    • pp.196-203
    • /
    • 2008
  • Hybrid robust image processing algorithm to extract visual features of melon during the cultivation was developed based on a wireless tele-operative interface. Features of a melon such as size and shape including position were crucial to successful task automation and future development of cultivation data base. An algorithm was developed based on the concept of hybrid decision-making which shares a task between the computer and the operator utilizing man-computer interactive interface. A hybrid decision-making system was composed of three modules such as wireless image transmission, task specification and identification, and man-computer interface modules. Computing burden and the instability of the image processing results caused by the variation of illumination and the complexity of the environment caused by the irregular stem and shapes of leaves and shades were overcome using the proposed algorithm. With utilizing operator's teaching via LCD touch screen of the display monitor, the complexity and instability of the melon identification process has been avoided. Hough transform was modified for the image obtained from the locally specified window to extract the geometric shape and position of the melon. It took less than 200 milliseconds processing time.

EPON Based Communication Network Architecture for Offshore Wind Power Farm (EPON을 기반으로 한 해상 풍력 단지 통신망 구조)

  • Jung, Jin-Hyo;Yang, Wonhyuk;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.2
    • /
    • pp.130-139
    • /
    • 2013
  • In recent, the communication networks of wind power farm are becoming crucial technologies for monitoring and controlling the large-scale offshore wind power farm. In this paper, EPON based communication network architectures are proposed in order to combat the problems of conventional Ethernet based communication network such as delay, data processing overhead and the fairness of data transmission among turbines in offshore wind power farm. The proposed architecture constructs the point to multi-point network by using OLT and ONUs installed in central control center and wind turbines respectively. The EPON based communication network architecture has low cost, high reliability, and fair transmission capability. To evaluate the performance of proposed architectures, the wind power farm based on IEC 61850 is modelled by using OPNET The simulation results are analyzed and compared with conventional Ethernet based communication network in terms of the overhead, delay and fairness of data transmission.

A Study on Channel Equalization Technique for High-Speed Processing on DSRC System (DSRC 시스템에서의 고속처리를 위한 채널등화기법에 대한 연구)

  • Sung Tae-Kyung;Choi Jong-Ho;Cho Hyung-Rae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.3 no.1 s.4
    • /
    • pp.109-116
    • /
    • 2004
  • The signal in wireless multi-path channel is affected by fading and ISI because of high data rate transmission, so the signal has the high error rate. The present modulation and demodulation method of DSRC system can not expect sufficient for providing data service over 1 Mbps, so the channel equalization and advanced modulation and demodulation methods are required. OFDM method is generally Inon as an effective technique for high data rate transmission system, since it can prevent ISI by inserting a guard interval. However, a guard interval longer than channel delay spread has to be used in each OFDM symbol period, thus resulting a considerable loss in the efficiency of channel utilization. Therefore the equalizer is necessary to cancel ISI to accommodate advanced ISI service with higher bit rate and longer channel delay spread condition. In this thesis, the channel equalizer for the OFDM-DSRC system was designed and its performance in a multi-path fading environment was evaluated with computer simulation. As a result, the performance of Pseudo LMMSE equalizer for the OFDM-DSRC has been improved comparing with LS equalizer at higher bit rate transmission system.

  • PDF

A Secure Health Data Transmission Protocol Using Identity-Based Proxy Re-Encryption in Remote Healthcare Monitoring System (원격건강정보 모니터링 시스템에서 신원기반 프록시 재암호화 기법을 이용한 건강정보 전송 보안 프로토콜)

  • Noh, Si-Wan;Park, Youngho;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.4
    • /
    • pp.197-202
    • /
    • 2017
  • The remote healthcare monitoring system enables a doctor to diagnose and monitor patient's health problem from a distance. Previous researches have focused on key establishment method between a patient and a particular doctor to solve personal health information disclosure problem in data transmission process. However, when considering a misdiagnosis of doctor, the result of a diagnosis by a many doctors is more reliable. In previous work, in order to select multiple doctors, patient should generate shared key for each chosen doctor and perform many times encryptions. Therefore, in this paper, we propose a secure data transmission protocol for receiving diagnosis from multiple doctors using identity-based proxy re-encryption scheme. In proposed protocol, a patient don't need key management work for session key. Also, monitoring server performs re-encryption process on behalf of patient. So, we can reduce computational burden of patient in previous work.

Examining the Influence of TBM Chamber Condition and Transmission Distance on the Received Strength of Bluetooth Low Energy Signals: A Laboratory Simulation Experiment (TBM 챔버 상태와 전송 거리에 따른 저전력 블루투스 신호의 수신 강도 분석: 실험실 모사 실험)

  • Yosoon Choi;Hoyoung Jeong;Jeongju Kim
    • Tunnel and Underground Space
    • /
    • v.33 no.5
    • /
    • pp.425-434
    • /
    • 2023
  • To measure the wear amount of the TBM disk cutter in real time, it is important not only to automate the measurement using sensors, but also to stably transmit the measured data to the information processing system. In this study, we investigated the viability of utilizing Bluetooth Low Energy (BLE) technology to wirelessly transmit sensor data from the TBM cutter head to a receiver located at the chamber's rear. Through laboratory experiments, we analyzed the Received Signal Strength Index (RSSI) of the receiver considering various signal strength of the transmitter, separation distances between the transmitter and receiver and chamber fill materials. Our results demonstrate that wireless data transmission is feasible across all tested conditions when the transmitter signal strength is 0 dBm or higher.

Low-Power Streamable AI Software Runtime Execution based on Collaborative Edge-Cloud Image Processing in Metaverse Applications (에지 클라우드 협동 이미지 처리기반 메타버스에서 스트리밍 가능한 저전력 AI 소프트웨어의 런타임 실행)

  • Kang, Myeongjin;Kim, Ho;Park, Jungwon;Yang, Seongbeom;Yun, Junseo;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1577-1585
    • /
    • 2022
  • As the interest in the 4th industrial revolution and metaverse increases, metaverse with multi edge structure is proposed and noted. Metaverse is a structure that can create digital doctor-like system through a large amount of image processing and data transmission in a multi edge system. Since metaverse application requires calculating performance, which can reconstruct 3-D space, edge hardware's insufficient calculating performance has been a problem. To provide streamable AI software in runtime, image processing, and data transmission, which is edge's loads, needs to be lightweight. Also lightweight at the edge leads to power consumption reduction of the entire metaverse application system. In this paper, we propose collaborative edge-cloud image processing with remote image processing method and Region of Interest (ROI) to overcome edge's power performance and build streamable and runtime executable AI software. The proposed structure was implemented using a PC and an embedded board, and the reduction of time, power, and network communications were verified.