• Title/Summary/Keyword: Mobile AP

Search Result 255, Processing Time 0.029 seconds

A Study for efficient location estimation using WLAN (무선랜 신호세기를 이용한 효율적인 위치인식에 관한 연구)

  • Lee, In-Chul;Kong, Young-Bae;Chang, Hyeong-Jun;Park, Gwi-Tae
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.1823-1824
    • /
    • 2007
  • 핸드폰, PDA, Laptop이 보편화 되면서 이를 이용한 위치 인식 기술의 중요성이 높아지고 있다. 이러한 위치기반 서비스(LBS : Location Based Service)는 GPS를 이용한 실외 서비스와 WLAN, Zigbee, UWB 등을 이용한 실내 서비스로 나눌 수 있다. 본 논문에서는 이미 많은 수의 기반시설(AP : Access Point)가 구축되어 있는 무선랜 기반의 효과적인 위치 측정 기법에 관한 연구를 모색 해보고자 한다. 각 AP에서 받은 신호세기(SS : Signal Strength)를 데이터 베이스에 저장한 후, 이동단말기(MU : Mobile Unit)의 위치가 요구되는 장소에서 다시 신호세기를 측정하여 데이터 베이스와 비교하여 가장 적합한 위치 데이터 정보를 리턴하는 핑거프린트(Fingerprint) 방식을 소개한다. 그리고 불안정한 신호 세기 데이터를 판별하기 위하여 단일 클래스 SVM 기법인 SVDD(Support Vector Data Description)을 이용하였다.

  • PDF

Security Reinforcement Technics against WDA in Mobile Communication System (이동통신 시스템에서의 WDA에 따른 보안 강화 기법)

  • Kim, Young Seok;Shim, Won
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1090-1093
    • /
    • 2010
  • 인터넷의 급격한 발전과 이용자의 증가로 인터넷은 이미 우리 사회에서 없어서는 안 될 중요한 요소가 되었다. 이러한 인터넷의 발달은 IT산업의 핵심요소가 되었으며 그 중요성이 점점 부각되고 있다. 특히 무선 네트워크는 다양한 단말기(노트북, PDA, 스마트폰)가 대중화되었고 이를 지원하는 표준이 만들어졌으며, 무선 네트워크 사용지역의 확대로 인하여 언제 어디에서나 정보환경에 가까이 접근할 수 있는 여건이 마련되었다. 그러나 이동성이 좋고 편리한 무선 네트워크의 장점의 이면에는 개인정보가 유출될 수 있는 치명적인 문제점들이 드러나기 시작했는데, 케이블을 사용하는 유선환경과는 달리 무선환경에서는 전파를 이용하여 통신하는 점을 악용하여 무선 AP를 도청하거나 패킷을 스니핑하여 개인정보를 유출하는 사례가 빈번하게 일어나고 있다. 본 논문에서는 현재 사용되고 있는 무선 네트워크의 기술표준을 분석해보고 실제 무선환경에서 개인정보가 얼마나 쉽게 노출될 수 있는가를 알아보기 위해 제작한 사설 안테나를 사용하여 무선 AP의 신호를 가로채 패킷을 분석하는 방법을 시연한다. 또한 안테나 각각의 지름을 달리하여 신호강도의 차이가 얼마나 있는지 분석하고, 개인정보를 보호하기 위한 방법을 제시한다.

Real time 2D/3D Object Detection on Edge Computing for Mobile Robot (모바일 로봇을 위한 엣지 컴퓨팅에서의 실시간 2D/3D 객체인식)

  • Jae-Young Kim;Hyungpil Moon
    • Annual Conference of KIPS
    • /
    • 2023.11a
    • /
    • pp.1161-1162
    • /
    • 2023
  • 모바일 로봇의 자율주행을 위하여 인터넷이 제약된 환경에서도 가능한 Edge computing 에서의 Object Detection 이 필수적이다. 본 논문에서는 이를 위해 Orin 보드에서 YOLOv7 과 Complex_YOLOv4 를 구현하였다. 직접 취득한 데이터를 통해 YOLOv7 을 구현한 결과 0.56 의 mAP 로 프레임당 133ms 가 소요되었다. Kitti Dataset 을 통해 Complex_YOLOv4 를 구현한 결과 0.88 의 mAP 로 프레임당 236ms 가 소요되었다. Comple_YOLOv4 가 YOLOv7 보다 더 많은 데이터를 예측하기에 시간은 더 소요되지만 높은 정확성을 가지는 것을 확인할 수 있었다.

Multi-type object detection-based de-identification technique for personal information protection (개인정보보호를 위한 다중 유형 객체 탐지 기반 비식별화 기법)

  • Ye-Seul Kil;Hyo-Jin Lee;Jung-Hwa Ryu;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.11-20
    • /
    • 2022
  • As the Internet and web technology develop around mobile devices, image data contains various types of sensitive information such as people, text, and space. In addition to these characteristics, as the use of SNS increases, the amount of damage caused by exposure and abuse of personal information online is increasing. However, research on de-identification technology based on multi-type object detection for personal information protection is insufficient. Therefore, this paper proposes an artificial intelligence model that detects and de-identifies multiple types of objects using existing single-type object detection models in parallel. Through cutmix, an image in which person and text objects exist together are created and composed of training data, and detection and de-identification of objects with different characteristics of person and text was performed. The proposed model achieves a precision of 0.724 and mAP@.5 of 0.745 when two objects are present at the same time. In addition, after de-identification, mAP@.5 was 0.224 for all objects, showing a decrease of 0.4 or more.

A MAC Enhancement Technique for Quality of Service Guarantee in Wireless Local Area Networks (무선 네트워크에서 QoS 보장을 위한 MAC 향상 기법)

  • Lee, Dong-Geon;Kim, Byoung-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1446-1459
    • /
    • 2008
  • In an infrastructure-based wireless network, an access point is used for all communications among mobile devices. However, when a mobile device moves into a dead Bone, a connectivity disruption between the mobile device and the access point occurs. Such connectivity disruption consequently leads to another connectivity disruption between the mobile device moving toward the dead zone and other wireless-enabled devices located within the area of the infrastructure-based wireless network. To cope with the connectivity disruption in the infrastructure-based wireless network the ad hoc network that dynamically forms a network without any preexisting communication infrastructure needs to be set up to provide seamless connections among mobile devices. In this paper, we propose the DNSQ-MAC (Dynamic Network State aware QoS-Medium Access Control) technique that meets the deadlines of MAC frames forwarded over hop-by-hop multipaths and guarantees the QoS performance of an ad hoc-based wireless network. Mobile devices incorporating the DNSQ-MAC technique are capable of adjusting to the new dynamic network status in order to enhance the QoS performance in the ad hoc-based wireless network. A case study which exploits the Qualnet simulator shows that the proposed DNSQ-MAC technique can guarantee the deadlines of MAC frames forwarded over hop-by-hop multipaths and enhance the QoS performance of various routing protocols and packet schedulers running on the network layer above the MAC layer.

  • PDF

Localization using Neural Networks and Push-Pull Estimation based on RSS from AP to Mobile Device (통신기지국과 모바일장치간의 수신신호강도를 기반으로 하는 신경망과 푸쉬-풀 평가를 이용한 위치추정)

  • Cho, Seong-Jin;Lee, Sung-Young
    • The KIPS Transactions:PartD
    • /
    • v.19D no.3
    • /
    • pp.237-246
    • /
    • 2012
  • Although the development of Global Positioning System (GPS) are more and more mature, its accuracy is just acceptable for outdoor positioning, not positioning for the indoor of building and the underpass. For the positioning application area for the indoor of building and the underpass, GPS even cannot achieve that accuracy because of the construction materials while the requirement for accurate positioning in the indoor of building and the underpass, because a space, a person is necessary, may be very small space with several square meters in the indoor of building and the underpass. The Received Signal Strength (RSS) based localization is becoming a good choice especially for the indoor of building and the underpass scenarios where the WiFi signals of IEEE 802.11, Wireless LAN, are available in almost every indoor of building and the underpass. The fundamental requirement of such localization system is to estimate location from Access Point (AP) to mobile device using RSS at a specific location. The Multi-path fading effects in this process make RSS to fluctuate unpredictably, causing uncertainty in localization. To deal with this problem, the combination for the method of Neural Networks and Push-Pull Estimation is applied so that the carried along the devices can learn and make the decision of position using mobile device where it is in the indoor of building and the underpass.

Mitigating Techniques for OFDMA System Based on SDD (SDD 기반 OFDMA 시스템을 위한 간섭 완화 기법)

  • Park, Chang-Hwan;Ko, Yo-Han;Kim, Moo-Chul;Park, Kyung-Won;Jeon, Won-Gi;Paik, Jong-Ho;Lee, Seok-Pil;Cho, Yong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8C
    • /
    • pp.742-749
    • /
    • 2009
  • In this paper, we propose mitigation techniques using time-domain shortening filter (TSF) and frequency-domain shortening filter (FSF) to overcome inter-block interference (IBn and inter-carrier interference (ICn due to the time difference of arrival (TDoA) and carrier frequency offset (CFO) between downlink and uplink signals from access point (AP) and subscriber station (SS) in synchronous digital duplexing (SDD)/orthogonal frequency division multiple access (OFDMA) systems for indoor wireless communication. The proposed TSF and FSF maximize SIR for shortening in time (SIRST) and SINR for shortening in frequency (SINRSF), respectively, by using channel impulse responses and timing information among stations, obtained from mutual ranging procedure. It is verified by computer simulation that the proposed TSF and FSF reduce effectively the effects of IBI and ICI in the SDD/OFDMA systems.

Implementation of Surveillance System using Motion Tracking Method based on Mobile (모바일 기반의 동작 추적 기법을 이용한 감시 시스템의 구현)

  • Kim, Hyeng-Gyun;Kim, Yong-Ho;Guen, Bae-Yong
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.164-169
    • /
    • 2008
  • This paper is using motion tracking by image segmentation to monitor intruders and to confirm based on mobile the relevant information. First, detect frame in animation that film fixed area, and make use of image subtraction between two frame that adjoin, segment fixed backing and target who move. Segmental foreground object to the edge detecting the location specified by the edge of the median estimate extracted by analyzing the motion of the intruders to monitor. When a motion is detected, the detected image is transmitted by using the W AP pull basis image transmission method on the mobile client data terminal.

  • PDF

Bluetooth Network for Mobile System Control (이동 시스템 제어를 위한 블루투스 네트워크)

  • 임준홍;곽재혁
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.11
    • /
    • pp.1052-1057
    • /
    • 2004
  • Bluetooth technology is essentially a method for wireless connectivity of a diverse set of devices ranging from PDAs, mobile phone, notebook computers, to another equipments, The bluetooth system both point-to point connection and point-to multipoint connection. In point-to multipoint connection, the channel is shared among several bluetooth devices. Two or more devices sharing the same channel form a piconet. There one master device and up to seven active slave devices in a piconet. The radio operates in the unlicensed 2.45GHz ISM band. This allows users who travel world-wide to use bluetooth equipments anywhere. Since the link is based on frequency-hop spread spectrum, multiple channels can exist at the same time. The bluetooth standard ha s been suggested that bluetooth equipments can be used in the short-range, maximum 100 meters. It has been defined that the time takes to setup and establish a bluetooth connection among devices is 10 seconds. It is a long time and may be a cause to lose a chance of finding other non-fixed devices. We propose a routing protocols for scatternets which can be used to control a mobile units(MUs) in this network. The proposed routing protocol is composed of two kinds of bluetooth information, access point(AP) and MU.

Data Processing Framework Design based on Smart Phon by Bluetooth (스마트폰 기반 블루투스 데이터 처리 프레임워크 설계)

  • Nam, Yong-Su;Kim, Tae-Yong;Lee, Hoon-Jae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.235-236
    • /
    • 2010
  • 본 논문에서는 블루투스 노드와 블루투스 AP(Access Point)를 이용하여 영화관, 기차역, 은행, 관공서 등의 다양한 장소의 키오스크 서버(Kiosk Server)에 모바일 기기로 원격으로 접속한다. 이때 모바일 단말기기는 사용자의 입력과 출력만을 담당하고 키오스크 서버는 전달된 데이터를 처리하여 사용자에게 전달하는 Profile의 프레임워크를 설계 한다.

  • PDF