• Title/Summary/Keyword: PAN ID

Search Result 10, Processing Time 0.033 seconds

Packet Discrimination Method Using Artificial Frequency Offsets for Low Decoding Power Consumption in Heterogeneous Cooperative Communication Systems (이기종 협력 통신시스템에서 디코딩 전력소모 감소를 위한 인위적인 주파수 오프셋을 이용한 패킷 구별 기법)

  • Chae, Seungyeob;Yeo, Gyuhak;Rim, Minjoong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.372-379
    • /
    • 2014
  • When a hand-held device with limited battery transmits and receives data using short-range wireless communication systems, such as WLAN(Wireless Local Area Network) or high speed WPAN(Wireless Personal Area Network), instead of mobile communication systems, the device is able to reduce the power consumption due to the reduced transmission distance. However, if there are many WLAN or high speed WPAN systems around the device, non-negligible power may be consumed by receiving and decoding the packets which have nothing to do with the device. In this paper, we propose a scheme reducing the power consumption by including physical-layer ID in WLAN or WPAN packets and avoiding unnecessary packet receptions. Also, we describe a method to determine the optimum number of physical-layer IDs.

A Study on Data Processing Methodology of Picking System using Zigbee Wireless Communication (지그비 무선 통신을 이용한 피킹 시스템의 데이터 처리방안에 관한 연구)

  • Kim, Young-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.269-274
    • /
    • 2013
  • In this paper, we propose the design and implementation method of picking system using zigbee wireless communication in order to solve problems of the conventional picking system which has expensive labors and maintenance costs. We use multi router based star-tree topology as a default routing topology to provide the reliable data transmission and define the method of ID configuration and data transmission. We confirm that successful data transmission ratio of multi router based picking system is maximum 20% higher than that of single router based picking system.

Angiotensin-converting enzyme gene insertion/deletion polymorphism is not associated with BMI in Korean adults

  • Kwon, Insu
    • Korean Journal of Exercise Nutrition
    • /
    • v.24 no.1
    • /
    • pp.24-28
    • /
    • 2020
  • [Purpose] Recent studies have demonstrated a probable association between ACE I/D polymorphism and obesity. Thus, this study aimed to investigate whether ACE I/D polymorphism influenced the susceptibly of developing obesity in Korean adults. [Methods] A total of 353 healthy Korean adults aged between 30 and 82 years were recruited, including 157 males and 196 females. Among the participants, 103 (29.2 %) were classified as normal (BMI < 23 kg/m2), 117 (33.1 %) as overweight (23 kg/m2 ≤ BMI < 25 kg/m2), and 133 (37.7 %) as obese (BMI ≥ 25 kg/m2). ACE polymorphism (rs1799752) analysis was performed using the MGB TaqMan® SNP Genotyping assay with 3 types of primers and 2 types of probes. The distributions of the ACE genotypes and allele frequencies were analyzed among the three groups using the Hardy-Weinberg equilibrium, chi-square tests, and multiple regression analysis. [Results] The distribution of the ACE genotypes were as follows: normal [II: n=38 (36.9 %), ID: n=46 (36.8 %), DD: n=19 (18.4 %)], overweight [II: n=43 (36.8 %), ID: n=55 (47.0 %), DD: n=19 (16.2 %)], and obese [II: n=41 (30.8 %), ID: n=76 (57.0 %), DD: n=16 (12.0 %)]. Unexpectedly, the I allele, rather than the D allele, was common in the obese group. [Conclusion] ACE I/D polymorphism is not associated with BMI in Korean adults. Thus, it is unlikely to be a powerful candidate gene for obesity in Korean adults.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

Implementation of Embedded Biometrics Technologies: a Security Token System for Fingerprints (임베디드 생체인식기술 구현: 지문 보안토큰 시스템)

  • Kim, Y.J.;Pan, S.B.;Moon, D.S.;Gil, Y.H.;Chung, Y.W.;Chung, K.I.
    • Electronics and Telecommunications Trends
    • /
    • v.17 no.6 s.78
    • /
    • pp.20-28
    • /
    • 2002
  • 지문 정보 등의 생체 정보를 이용하는 생체 기술은 컴퓨터 시스템의 로그인, 출입 ID, 전자상거래 보안 등의 여러 서비스에서 사용자의 안전한 인증을 위해 널리 사용되고 있다. 근래에 이르러, 생체 기술은 비밀 번호와 같은 기존의 개인 인증 방법에 비해 안전하면서도 자동화를 가져올 수 있다는 장점으로 인해 보안 토큰, 스마트 카드와 같은 소형의 임베디드 시스템에 탑재되고 이용되는 추세이다. 본 논문에서는 보안 토큰을 이용한 생체 인식 기술의 시장 동향을 살펴보고 임베디드 시스템의 형태인 보안 토큰 시스템을 개발하고 시험한 결과를 기술하였다. 보안 토큰과 호스트와의 통신은 USB를 이용하여 시험 및 검증하였으며 보안 토큰 상에서의 지문 정합 프로그램의 성능 측정 및 개선에 대해 기술하였다. 나아가, 보안 토큰에서 매치 온 카드(match-on-card)로의 전이를 위해 필요한 내용을 언급하였다.

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

Design of DC-DC converter for a logic process MTP memory IPs (로직 공정 기반의 MTP IP용 DC-DC 컨버터 설계)

  • Park, Heon;Lee, Seung-Hoon;Jin, Kyo-Hong;Ha, Pan-Bong;Kim, Young-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.832-836
    • /
    • 2015
  • In this paper, a DC-DC converter is designed for logic process MTP (multi-time programmable) memory IPs using dual program voltage, which are used for analog trimming or storing chip IDs in sensor applications. The DC-DC converter supplies VPP (=5.25V), VNN (=-5.25V), and VNNL ($=2{\cdot}VNN/5$). It uses MOS capacitors and designed with only 3,3V devices. VPP and VNN are configured in two and five stages, respectively. And their pumping currents are $9.17{\mu}A$ and $9.7{\mu}A$, respectively.

  • PDF

Condition assessment of stay cables through enhanced time series classification using a deep learning approach

  • Zhang, Zhiming;Yan, Jin;Li, Liangding;Pan, Hong;Dong, Chuanzhi
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.105-116
    • /
    • 2022
  • Stay cables play an essential role in cable-stayed bridges. Severe vibrations and/or harsh environment may result in cable failures. Therefore, an efficient structural health monitoring (SHM) solution for cable damage detection is necessary. This study proposes a data-driven method for immediately detecting cable damage from measured cable forces by recognizing pattern transition from the intact condition when damage occurs. In the proposed method, pattern recognition for cable damage detection is realized by time series classification (TSC) using a deep learning (DL) model, namely, the long short term memory fully convolutional network (LSTM-FCN). First, a TSC classifier is trained and validated using the cable forces (or cable force ratios) collected from intact stay cables, setting the segmented data series as input and the cable (or cable pair) ID as class labels. Subsequently, the classifier is tested using the data collected under possible damaged conditions. Finally, the cable or cable pair corresponding to the least classification accuracy is recommended as the most probable damaged cable or cable pair. A case study using measured cable forces from an in-service cable-stayed bridge shows that the cable with damage can be correctly identified using the proposed DL-TSC method. Compared with existing cable damage detection methods in the literature, the DL-TSC method requires minor data preprocessing and feature engineering and thus enables fast and convenient early detection in real applications.

Results of the 2019 European Parliament Elections: The Rise of Far-right Populism and Liberal Centrism (2019년 유럽의회선거의 함의: 극우 포퓰리즘과 중도자유주의의 부상)

  • OH, Chang Rhyong
    • Korean Journal of Legislative Studies
    • /
    • v.25 no.2
    • /
    • pp.5-33
    • /
    • 2019
  • This study aims to explore the implications of the 2019 European Parliament elections. Existing studies show that European elections serve as secondary elections dominated by domestic issues. However, the 2019 European elections have highlighted pan-European issues such as the Brexit negotiations and the rise of far-right populism, with voter turnout also rising sharply to 50.62%, which is the highest record since the 2000s. There was also a significant change in the number of parliamentary seats held by each political group. First, the European People's Party(EPP) and the Progressive Alliance of Socialists and Democrats(S&D), which had hitherto led the European Parliament, failed to achieve a majority. Second, the number of seats won by Renew Europe, a new liberal-centrist group, was considerably high. Third, the far-right groups organized a full-fledged political force by rallying around the Identity and Democracy(ID) group. The rise of liberal-centrism can be explained as a reaction to the popularity of anti-European populism. Renew Europe's emphasis on open-market competition has created a different issue, especially since the center-left and center-right groups have stressed on the need for state intervention in employment, welfare, security and immigration control. Along with far-right populism, liberal centrism has also reshuffled Europe's political cleavage, and the conflict between 'liberalism' and 'protectionism' has become more evident in the European Parliament.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.