• Title/Summary/Keyword: Mobile system

Search Result 9,561, Processing Time 0.042 seconds

Design of Embedded Security Controller Based on Client Authentication Utilizing User Movement Information (사용자의 이동정보를 활용한 클라이언트 인증 기반의 임베디드 보안 컨트롤러 설계)

  • Hong, Suk-Won
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.163-169
    • /
    • 2020
  • A smart key has been used in a variety of embedded environments and there also have been attacks from a remote place by amplifying signals at a location of a user. Existing studies on defence techniques suggest multiple sensors and hash functions to improve authentication speed; these, however, increase the electricity usage and the probability of type 1 error. For these reasons, I suggest an embedded security controller based on client authentication and user movement information improving the authentication method between a controller and a host device. I applied encryption algorithm to the suggested model for communication using an Arduino board, GPS, and Bluetooth and performed authentication through path analysis utilizing user movement information for the authentication. I found that the change in usability was nonsignificant when performing actions using the suggested model by evaluating the time to encode and decode. The embedded security controller in the model can be applied to the system of a remote controller for a two-wheeled vehicle or a mobile and stationary host device; in the process of studying, I found that encryption and decryption could take less then 100ms. The later study may deal with protocols to speed up the data communication including encryption and decryption and the path data management.

A Study on Fabrication and Performance Evaluation of Wideband 2-Mode HPA for the Satellite Mobile Communications System (이동위성 통신용 광대역 2단 전력제어 HPA의 구현 및 성능평가에 관한 연구)

  • 전중성;김동일;배정철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.3
    • /
    • pp.517-531
    • /
    • 1999
  • This paper presents the development of the 2-mode variable gain high power amplifier for a transmitter of INMARSAT-M operating at L-band(1626.5-1646.5 MHz). This SSPA(Solid State Power Amplifier) is amplified 42 dBm in high power mode and 36 dBm in low power mode for INMARSAT-M. The allowable error sets +1 dBm of an upper limit and -2 dBm of a lower limit, respectively. To simplify the fabrication process, the whole system is designed by two parts composed of a driving amplifier and a high power amplifier, The HP's MGA-64135 and Motorola's MRF-6401 are used for driving amplifier, and the ERICSSON's PTE-10114 and PTF-10021 are used the high power amplifier. The SSPA was fabricated by the circuits of RF, temperature compensation and 2-mode gain control circuit in aluminum housing. The gain control method was proposed by controlling the voltage for the 2-mode. In addition, It has been experimentally verified that the gain is controlled for single tone signal as well as two tone signals. The realized SSPA has 42 dB and 36 dB for small signal gain within 20 MHz bandwidth, and the VSWR of input and output port is less than 1.5:1 The minimum value of the 1 dB compression point gets 5 dBm for 2-mode variable gain high power amplifier. A typical two tone intermodulation point has 32.5 dBc maximum which is single carrier backed off 3 dB from 1 dB compression point. The maximum output power of 43 dBm was achieved at the 1636.5 MHz. These results reveal a high power of 20 Watt, which was the design target.the design target.

  • PDF

A Study on Adhesion of Mechanical Properties of Rubber by MgCl2 (투명 차폐 필름 구현을 위한 전도성 복합 바인더의 입자구조에 따른 성능 평가)

  • Park, Ji-won;Back, Jong-Ho;Lee, Tae-Hyung;Kim, Hyun-Joong
    • Journal of Adhesion and Interface
    • /
    • v.18 no.2
    • /
    • pp.59-67
    • /
    • 2017
  • Recently, integration of parts is accelerating according to the growth of the smart mobile industry. The integration of these parts causes problems of interference phenomena between the parts, and the importance of electromagnetic wave shielding technology to solve this problem is highlighted. Electromagnetic wave shielding technology is implemented so as to reflect or absorb electromagnetic waves, and generally conductive materials are utilized for electromagnetic wave shielding. Transparent shielding technology is required according to recent industrial changes. In this research, we propose transparent the shielding film using imprint technology with conductive composite binder. Utilizing UV polymerized acrylic binder to produce a conductive composite binder. Spherical, plate and stacked silver particles were used for conductivity. The changes of the curing characteristics, conductivity and adhesion were observed according to the structural characteristics of the silver particles. The use of spherical particles was the most efficient in the curing process, and an additional curing system was required to complement the UV-shadowing structure. In the conductivity evaluation, the stacked structure showed excellent characteristics. The adhesion of spherical system was the best. It is evaluated as a result of irregularities on the surface. Ultimately, the patterned film using this showed excellent transparency characteristics.

The Korean Peninsula security and Military Strategy of USA and China (미.중의 군사전략과 한반도 안보)

  • Son, Do-Sim
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.289-350
    • /
    • 2006
  • The world has been rapidly restructured in an agenda of national security from center of military strength to that of economic strength since the post cold-war era China military leadership-division carried out RMA through learning of a lesson from Gulf war in 1990 -1991 and Iraq war in 2003, thus the leadership-division made an attempt to convert the military system to a technical intensive system. The principle based on RMA of China military is (National defense strategy) drafted by the central military committee 1985 and (Four modernization general principles) 1978. China has introduced Russian high-technological arms and equipment in order to build up the military arms greatly thanks to an economical development, and they take pragmatism line as chinese socialism with their strategy to make secure a position as military powers such as they successfully launched a manned spacecraft and are building an air-craft carrie and soon. USA has a theory of dichotomy whether a country is a cooperator for USA, or not. and also enemy or friend since 9.11terror, thus USA is different from their direction of police. This is because USA stands a position as the superpower of the supremacy hegemony of the world. We must be carefully aware that USA considers as important area for Middle east, West south Asia, Central Asia and Northwest Asia to meet the demands of 2lcentury. Accordingly, the focus of USA's military strategy will be probably concentrated at the above mentioned four areas. On the other hand, USA enjoys such a superpower position due to collapse of USSR which was the past main enemy since the post cold war era. We could give an conclusive example as fact that USA has recurred to unilateralism But USA carry on the military operations to the terror groups at global around by converting thje military strike strategy to pre-emptive strike strategy since9.11 terror, 2001. USA seeks for transformation to the mobile military forces with light-quantity oriented in order to carry on such the military operations and makes progress GPR, And the USA forces in Korea makes progress a military renovation as part of such a military strategy. On the other hand, USA promotes the measures of choose for the countries standing at the crossroads of strategy and carries forward a main scheme of provision for four priority aims that the leaders of a hostile country and mis-country shall be prohibited from use and obtainment of weapons of mass destruction. Accordingly, this treatise found out a significant meaning to have an effect on the national security in the korean peninsula.

  • PDF

Optimal Release Problems based on a Stochastic Differential Equation Model Under the Distributed Software Development Environments (분산 소프트웨어 개발환경에 대한 확률 미분 방정식 모델을 이용한 최적 배포 문제)

  • Lee Jae-Ki;Nam Sang-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7A
    • /
    • pp.649-658
    • /
    • 2006
  • Recently, Software Development was applied to new-approach methods as a various form : client-server system and web-programing, object-orient concept, distributed development with a network environments. On the other hand, it be concerned about the distributed development technology and increasing of object-oriented methodology. These technology is spread out the software quality and improve of software production, reduction of the software develop working. Futures, we considered about the distributed software development technique with a many workstation. In this paper, we discussed optimal release problem based on a stochastic differential equation model for the distributed Software development environments. In the past, the software reliability applied to quality a rough guess with a software development process and approach by the estimation of reliability for a test progress. But, in this paper, we decided to optimal release times two method: first, SRGM with an error counting model in fault detection phase by NHPP. Second, fault detection is change of continuous random variable by SDE(stochastic differential equation). Here, we decide to optimal release time as a minimum cost form the detected failure data and debugging fault data during the system test phase and operational phase. Especially, we discussed to limitation of reliability considering of total software cost probability distribution.

A Study of Electromagnetic Coupling Analysis between Dipole Antenna and Transmission Line Using PEEC Method (PEEC 방법을 이용한 다이폴 안테나와 전송선로 사이의 전자기 결합 분석에 관한 연구)

  • Oh, Jeongjoon;Kim, Kwangho;Park, Myeongkoo;Lee, Hosang;Nah, Wansoo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.11
    • /
    • pp.902-915
    • /
    • 2017
  • In recent years, mobile devices have become increasingly multi-functional and high performance, resulting in a dramatical increase in processing speed. On the other hand, the size of device is reduced, circuits inside the device are more easily exposed to electromagnetic interference radiated from antenna or adjacent circuits, degrading the system performance. To prevent this, it is necessary to design the device considering the electromagnetic characteristics with EM simulation at the design stage of product. However, the EM simulation takes a long analysis time and require high-level system resources for fast analysis. In this paper, an equivalent circuit modeling method for a round wire is proposed using a PEEC method and the electromagnetic coupling from a dipole antenna to a transmission line is analyzed in frequency domain. And compared with the result of electromagnetic simulator. As a result, PEEC method shows good agreement with those of electromagnetic simulation, in a much more short time.

Erlang Capacity for the Reverse Link of a IS-95 Cellular System According to Approximation Method in Shadowing Channel (전파음영 채널에서 근사방법에 따른 IS-95 셀룰라 시스템의 역방향 링크에 대한 얼랑 용량)

  • Park, Young;Kim, Hang-Rae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3210-3218
    • /
    • 2000
  • In a IS-95 cellular systm, blocking will occur when the reverse link user interference power reaches a predepermmed level which is set to maintam acceptable signal quality. In this paper, it is assumed that a mobile rdio channel is a shadowing channel and Erlang capacity is calculated for the reverse limk of an imperfect power controlled IS-95 cellular system. the blocking probability is derived using lognornal pproximation and the results according to guassian and lognormal approximation method are compared and analyzed respcctively. Assuming that blocking probability is 1% at the data rate of $R_b$=9.6kbps and $R_b$=14.4kbps, it is shown that Erlang capacity using Iognormal approximation is 13.68 Erlang and 7.08 Erlang and then the approximation erroris occurred about 24.4% and 40.4% inthe garssian approximation, respectively. It is also observed that if the power control becomes periect, the Erlang capacity is increased more 6.99 and 4.21 Erlang than that of the imperfect power control that the power contrl error is 2.5dB, and if voice activity is considered as 10%, the Erlang capacity is increased more 8.21 and 1.25 Erlang than that using non voice activity, respectively.

  • PDF

Field Application of RFID for the Cavity Maintenance of Under Pavement (도로하부 공동의 유지관리를 위한 RFID의 현장 적용성 평가)

  • Park, Jeong Jun;Shin, Eun Chul;Kim, In Dae
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.4
    • /
    • pp.459-468
    • /
    • 2019
  • Purpose: The cavity exploration of the lower part of the road is carried out to prevent ground-sinking. However, the detected communities cannot be identified by the cavity location and history information, such as repackaging the pavement. Therefore, the field applicability of RFID systems was evaluated in this study to enable anyone to accurately identify information. Method: During temporary recovery, tag recognition distance and recognition rate were measured according to underground burial materials and telecommunication tubes using RFID systems with electronic tag chips attached to the bottom of the rubber cap. Result: The perceived distance and perceived rate of depth for each position of the electron tag did not significantly affect the depth up to 15cm, but it did have some effect if the depth was 20cm. In addition, water effects from nearby underground facilities and rainfall are relatively small, and the effects of wind will need to be considered during the weather conditions of the road. Conclusion: The RFID tags for field application of the pavement management system store various information such as location and size of cavity, identification date, cause of occurrence, and surrounding underground facilities to maximize cavity management effect with a system that can be computerized and mobile utilization.

Vertical Handover between LTE and Wireless LAN Systems based on Common Radio Resource Management (CRRM) and Generic Link Layer (GLL) (LTE/WLAN 이종망 환경에서 범용링크계층과 통합무선자 원관리 기법이 적용된 VHO 방안 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Yoon, Suk-Ho;Ryu, Seung-Wan;Cho, Choong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.35-48
    • /
    • 2010
  • For the next generation mobile communication system, diverse wireless network techniques such as beyond 3G LTE, WiMAX/WiBro, and next generation WLAN etc. are proceeding to the form integrated into the All-IP core network. According to this development, Beyond 3G integrated into heterogeneous wireless access technologies must support the vertical handover and network to be used of several radio networks. However, unified management of each network is demanded since it is individually serviced. Therefore, in order to solve this problem this study is introducing the theory of Common Radio Resource Management (CRRM) based on Generic Link Layer (GLL). This study designs the structure and functions to support the vertical handover and propose the vertical handover algorithm of which policy-based and MCDM are composed between LTE and WLAN systems using GLL and CRRM. Finally, simulation results are presented to show the improved performance over the data throughput, handover success rate and the system service cost.

교실은 어떻게 '스마트'해지는가?

  • JEONG, Hanbyul
    • Journal of Science and Technology Studies
    • /
    • v.19 no.3
    • /
    • pp.201-246
    • /
    • 2019
  • Information technology is sometimes considered as a cause that puts education in a big crisis, or it can be seen as a savior. In 2011, the Korean government announced that it would innovate education and build a talented nation by bringing IT into schools of public education system through the SMART education policy. The policy initiative aimed to establish a standard classroom models that can be diffused all over the country's schools so that teachers and students may become familiar of using devices such as tablet PCs and laptops. This paper analyzes how the smart classrooms caused friction in the actual education practices. To this end, I analyzed the direction and ideals of the SMART education policy by reading government policy document and design guidelines officially published, and visited three elementary schools that are actually building and operating a smart classroom environment to visit the facilities and have in-depth interviews with teachers and technicians. The ideal type of classroom proposed by the smart education policy was a package equipped with various functions at once in a neatly designed space like a "model house", but it was difficult to be used as a normal classroom in everyday life of school. Instead of copying and installing the model, each school decided to get "smart" in its own way, depending on how factors such as size, local characteristics, socioeconomic conditions of students and teachers, teacher experiences, and the level of existing infrastructure were combined. In Elementary School A, the machines tamed specific space of the school to create their own space, while following the rules of the school for being mobile. Although Elementary School B could not construct fully supported environment that encompassed the entire school, the system was organized with the help of well trained teacher's experiences in other schools. In Elementary School C, the machines are concentrated on specific classrooms and they promote teacher's professionalism. The components of the smart classroom were disassembled and recombined in context to make each school's classroom "smart".