• Title/Summary/Keyword: Networks Safety

Search Result 582, Processing Time 0.027 seconds

Wearable antenna for Body area Network

  • Lim, Eng Gee;Wang, Zhao;Lee, Sanghyuk
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.27-32
    • /
    • 2013
  • Wireless Body Area Networks (WBAN) have been made possible by the emergence of small and lightweight wireless systems such as Bluetooth, enabled devices and PDAs. Antennas are an essential part of any WBAN system and due to various technical requirements and physical constraints, careful consideration of their design and deployment is needed. This paper is proposing on the design of wearable antenna as parts of clothing to serve communications functions, such as tracking and navigation in health care applications. The substrates of the wearable antennas will be made from textile materials and since it is wearable, it should have a small size, be light weight, low maintenance, and unobtrusive. This proposed paper will also investigate the influence of different parameters for wearable antenna including types of textile/substrate to ensure that the antenna design satisfies WBAN requirements. The characteristics and behavior of the antenna need to adhere to specifications set by wireless standards and system technology requirements. This means that the transmitting and receiving frequency bands of the various units need to be chosen accordingly. Since there are restrictions on the level of power to which the human body can be exposed to, the antenna as well as other RF system components must be designed to meet these restrictions. Antenna gain, which directly affects power transmitted, is a critical parameter in ensuring power levels fall within the safety guidelines and so will be of primary importance in the design. The electromagnetic interaction between WBAN antennas and devices and the human body will also be explored.

  • PDF

Development of a Prototype Patient Monitoring System with Module-Based Bedside Units and Central Stations: Overall Architecture and Specifications (모듈형 환자감시기와 중앙 환자감시기로 구성되는 환자감시시스템 시제품의 개발: 전체구조 및 사양)

  • Woo, E.J.;Park, S.H.;Jun, B.M.;Moon, C.W.;Lee, H.C.;Kim, S.T.;Kim, H.J.;Seo, J.J.;Chae, K.M.;Park, J.C.;Choi, K.H.;Lee, W.J.;Kim, K.S.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1996 no.05
    • /
    • pp.315-319
    • /
    • 1996
  • We have developed a prototype patient monitoring system including module-based bedside units, interbed network, and central stations. A bedside unit consists of a color monitor and a main CPU unit with peripherals including a module controller. It can also include up to 3 module cases and 21 different modules. In addition to the 3-channel recorder module, six different physiological parameters of ECG, respiration, invasive blood pressure, noninvasive blood pressure, body temperature, and arterial pulse oximetry with plethysmogaph are provided as parameter modules. Modules and a module controller communicate with up to 1Mbps data rate through an intrabed network based on RS-485 and HDLC protocol. Bedside units can display up to 12 channels of waveforms with any related numeric informations simultaneously. At the same time, it communicates with other bedside units and central stations through interbed network based on 10Mbps Ethernet and TCP/IP protocol. Software far bedside units and central stations fully utilizes gaphical user interface techniques and all functions are controlled by a rotate/push button on bedside unit and a mouse on central station. The entire system satisfies the requirements of AAMI and ANSI standards in terms of electrical safety and performances. In order to accommodate more advanced data management capabilities such as 24-hour full disclosure, we are developing a relational database server dedicated to the patient monitoring system. We are also developing a clinical workstation with which physicians can review and examine the data from patients through various kinds of computer networks far diagnosis and report generation. Portable bedside units with LCD display and wired or wireless data communication capability will be developed in the near future. New parameter modules including cardiac output, capnograph, and other gas analysis functions will be added.

  • PDF

Secure and Efficient Protocol for Vehicular Communication with Privacy Preservation (프라이버시를 보호하며 안전하고 효율적인 차량간 통신 프로토콜)

  • Kim, In-Hwan;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.420-430
    • /
    • 2010
  • Due to increasing demand for improving road safety and optimizing road traffic, Vehicular Ad-Hoc Networks (VANET) have been subject to extensive attentions from all aspects of commercial industry and academic community. Security and user privacy are fundamental issues for all possible promising applications in VANET. Most of the existing security proposals for secure VANET concentrate authentication with privacy preservation in vehicle-to-vehicle (V2V) and vehicle-to-roadside infrastructure (V2I) communications and require huge storage and network capacity for management of revocation list. Motivated by the fact, we propose a new scheme with security and privacy preservation which combines V2V and V2I communication. With our proposed scheme, the communication and computational delay for authentication and overhead for management of revocation list can be significantly reduced due to mutual authentication between a vehicle and a Roadside Unit (RSU) requires only two messages, and the RSU issues the anonymous certificate for the vehicle on behalf of the Trust Authority (TA). We demonstrate that the proposed protocol cannot only guarantee the requirements of security and privacy but can also provide efficiency of authentication and management of revocation list.

A review on recent advances in water and wastewater treatment facilities management for earthquake disaster response (지진발생 대응을 위한 상하수도시설 관리 및 기술 현황에 대한 고찰)

  • Park, Jungsu;Choi, June-Seok;Kim, Keugtae;Yoon, Younghan;Park, Jae-Hyeoung
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.34 no.1
    • /
    • pp.9-21
    • /
    • 2020
  • The proper operation and safety management of water and wastewater treatment systems are essential for providing stable water service to the public. However, various natural disasters including floods, large storms, volcano eruptions and earthquakes threaten public water services by causing serious damage to water and wastewater treatment plants and pipeline systems. Korea is known as a country that is relatively safe from earthquakes, but the recent increase in the frequency of earthquakes has increased the need for a proper earthquake management system. Interest in research and the establishment of legal regulations has increased, especially since the large earthquake in Gyeongju in 2016. Currently, earthquakes in Korea are managed by legal regulations and guidelines integrated with other disasters such as floods and large storms. The legal system has long been controlled and relatively well managed, but technical research has made limited progress since it was considered in the past that Korea is safe from earthquake damage. Various technologies, including seismic design and earthquake forecasting, are required to minimize possible damages from earthquakes, so proper research is essential. This paper reviews the current state of technology development and legal management systems to prevent damages and restore water and wastewater treatment systems after earthquakes in Korea and other countries. High technologies such as unmanned aerial vehicles, wireless networks and real-time monitoring systems are already being applied to water and wastewater treatment processes, and to further establish the optimal system for earthquake response in water and wastewater treatment facilities, continuous research in connection with the Fourth Industrial Revolution, including information and communications technologies, is essential.

Bus-only Lane and Traveling Vehicle's License Plate Number Recognition for Realizing V2I in C-ITS Environments (C-ITS 환경에서 V2I 실현을 위한 버스 전용 차선 및 주행 차량 번호판 인식)

  • Im, Changjae;Kim, Daewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.87-104
    • /
    • 2015
  • Currently the IoT (Internet of Things) environments and related technologies are being developed rapidly through the networks for connecting many intelligent objects. The IoT is providing artificial intelligent services combined with context recognition based knowledge and communication methods between human and objects and objects to objects. With the help of IoT technology, many research works are being developed using the C-ITS (Cooperative Intelligent Transport System) which uses road infrastructure and traveling vehicles as traffic control infrastructures and resources for improving and increasing driver's convenience and safety through two way communication such as bus-only lane and license plate recognition and road accidents, works ahead reports, which are eventually for advancing traffic effectiveness. In this paper, a system for deciding whether the traveling vehicle is possible or not to drive on bus-only lane in highway is researched using the lane and number plate recognition on the road in C-ITS traffic infrastructure environments. The number plates of vehicles on the straight ahead and sides are identified after the location of bus-only lane is discovered through the lane recognition method. Research results and experimental outcomes are presented which are supposed to be used by traffic management infrastructure and controlling system in future.

Lightweight Validation Mechanism for IoT Sensing Data Based on Obfuscation and Variance Analysis (난독화와 변화량 분석을 통한 IoT 센싱 데이터의 경량 유효성 검증 기법)

  • Yun, Junhyeok;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.9
    • /
    • pp.217-224
    • /
    • 2019
  • Recently, sensor networks are built and used on many kinds of fields such as home, traffic, medical treatment and power grid. Sensing data manipulation on these fields could be a serious threat on property and safety. Thus, a proper way to block sensing data manipulation is necessary. In this paper, we propose IoT(Internet of Things) sensing data validation mechanism based on data obfuscation and variance analysis to remove manipulated sensing data effectively. IoT sensor device modulates sensing data with obfuscation function and sends it to a user. The user demodulates received data to use it. Fake data which are not modulated with proper obfuscation function show different variance aspect with valid data. Our proposed mechanism thus can detect fake data by analyzing data variance. Finally, we measured data validation time for performance analysis. As a result, block rate for false data was improved by up to 1.45 times compared with the existing technique and false alarm rate was 0.1~2.0%. In addition, the validation time on the low-power, low-performance IoT sensor device was measured. Compared to the RSA encryption method, which increased to 2.5969 seconds according to the increase of the data amount, the proposed method showed high validation efficiency as 0.0003 seconds.

Probability-based Critical Path Estimation for PERT Networks of Repetitive Activities (반복작업 PERT 네트워크의 확률기반 주공정 산정기법)

  • Yi, Kyoo-Jin
    • Journal of the Korea Institute of Building Construction
    • /
    • v.18 no.6
    • /
    • pp.595-602
    • /
    • 2018
  • Network-based scheduling methods can be classified into CPM method and PERT method. In the network scheduling chart, critical path can be estimated by performing the forward calculation and the backward calculation though the paths in the network chart. In PERT method, however, it is unreasonable to simply estimate the critical path by adding the sum of the activity durations in a specific path, since it does not incorporate probabilistic concept of PERT. The critical path of a PERT network can change according to the target period and deviation, and in some cases, the expected time of the critical path may not be the path with longest expected time. Based on this concept, this study proposes a technique to derive the most-likely critical path by comparing the sum of estimated time with the target time. It also proposes a method of systematically deriving all alternate paths for a network of repetitive activities. Case studies demonstrated that the most-likely critical path is not a fixed path and may vary according to the target period and standard deviation. It is expected that the proposed method of project duration forecasting will be useful in construction environment with varying target date situations.

A Secure and Lightweight Authentication Scheme for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 안전하고 경량화 된 인증기법)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.77-83
    • /
    • 2019
  • With the increase in population, the number of such senior citizens is increasing day by day. These senior citizens have a variety of care needs, but there are not enough health workers to look after them. Ambient Assisted Living (AAL) aims at ensuring the safety and health quality of the older adults and extending the number of years the senior citizens can live independently in an environment of their own preference. AAL provides a system comprising of smart devices, medical sensors, wireless networks, computer and software applications for healthcare monitoring. AAL can be used for various purposes like preventing, curing, and improving wellness and health conditions of older adults. While information security and privacy are critical to providing assurance that users of AAL systems are protected, few studies take into account this feature. In this paper, we propose a secure and lightweight authentication scheme for the AAL systems. The proposed authentication scheme not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. Also, the security analysis results are presented to show the proposed authentication scheme is more secure and efficient rather than existing authentication schemes.

Binary classification of bolts with anti-loosening coating using transfer learning-based CNN (전이학습 기반 CNN을 통한 풀림 방지 코팅 볼트 이진 분류에 관한 연구)

  • Noh, Eunsol;Yi, Sarang;Hong, Seokmoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.651-658
    • /
    • 2021
  • Because bolts with anti-loosening coatings are used mainly for joining safety-related components in automobiles, accurate automatic screening of these coatings is essential to detect defects efficiently. The performance of the convolutional neural network (CNN) used in a previous study [Identification of bolt coating defects using CNN and Grad-CAM] increased with increasing number of data for the analysis of image patterns and characteristics. On the other hand, obtaining the necessary amount of data for coated bolts is difficult, making training time-consuming. In this paper, resorting to the same VGG16 model as in a previous study, transfer learning was applied to decrease the training time and achieve the same or better accuracy with fewer data. The classifier was trained, considering the number of training data for this study and its similarity with ImageNet data. In conjunction with the fully connected layer, the highest accuracy was achieved (95%). To enhance the performance further, the last convolution layer and the classifier were fine-tuned, which resulted in a 2% increase in accuracy (97%). This shows that the learning time can be reduced by transfer learning and fine-tuning while maintaining a high screening accuracy.

Secure and Efficient V2V Message Authentication Scheme in Dense Vehicular Communication Networks (차량 밀집환경에서 안전하고 효율적인 V2V 메시지 인증기법)

  • Jung, Seock-Jae;Yoo, Young-Jun;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.41-52
    • /
    • 2010
  • Message authentication is an essential security element in vehicular ad-hoc network(VANET). For a secure message authentication, integrity, availability, privacy preserving skill, and also efficiency in various environment should be provided. RAISE scheme has been proposed to provide efficient message authentication in the environment crowded with lots of vehicles and generally considered to be hard to provide efficiency. However, as the number of vehicles communicating in the area increases, the overhead is also incurred in proportion to the number of vehicles so that it still needs to be reduced, and the scheme is vulnerable to some attacks. In this paper, to make up for the vulnerabilities in dense vehicular communication network, we propose a more secure and efficient scheme using a process that RSU(Road Side Unit) transmits the messages of neighbor vehicles at once with Bloom Filter, and timestamp to protect against replay attack. Moreover, by adding a handover function to the scheme, we simplify the authentication process as omitting the unnecessary key-exchange process when a vehicle moves to other area. And we confirm the safety and efficiency of the scheme by simulating the false positive probability and calculating the traffic.