• Title/Summary/Keyword: Personal Area Network

Search Result 371, Processing Time 0.026 seconds

A Study on the Implementation of WBAN-Based Medical Gateway (WBAN 기반의 의료용 게이트웨이 구현에 관한 연구)

  • Park, Yong-Min
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.640-647
    • /
    • 2014
  • The WBAN technology means a short distance wireless network which provides each device's interactive communication by connecting devices inside and outside of body located within 3 meters. It is necessary to develop core technology that the WBAN middleware and application service for WBAN sensor network. A device for gathering patient's biometric information was used zigbex of Hanbaek electronics and we designed the message structure which is collected the biometric information. The gateway design and implementation for the WBAN environment. The embedded system was HBE-empos II of Hanbaek electronics and the WBAN network is implemented to BNC and BN that used for hbe-ubi-zigbex. It was confirmed that the proposed sensor gateway could be used for the interconnection of the proposed system with other networks.

Isolated-Word Recognition Using Neural Network and Hidden Markov Model (Neural-HMM을 이용한 고립단어 인식)

  • 김연수;김창석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.11
    • /
    • pp.1199-1205
    • /
    • 1992
  • In this paper, a Korean word recognition method which usese Neural Network and Hidden Markov Models(HMM) is proposed to improve a recognition rate with a small amount of learning data. The method reduces the fluctuation due to personal differences which is a problem to a HMM recognition system. In this method, effective recognizer is designed by the complement of each recognition result of the Hidden Markov Models(HMM) and Neural Network. In order to evaluate this model, word recognition experiment is carried out for 28 cities which is DDD area names uttered by two male and a female in twenties. As a result of testing HMM with 8 state, codeword is 64, the recognition rate 91[%], as a result of testing Neural network(NN) with 64 codeword the recognition rate is 89[%]. Finally, as a result of testing NN-HMM with 64 codeword which the best condition in former tests, the recognition rate is 95[%].

  • PDF

The Status of the Bring Your Own Device (BYOD) in Saudi Arabia: Dataset

  • Khalid A. Almarhabi;Adel A. Bahaddad;Ahmed M. Alghamdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.203-209
    • /
    • 2023
  • The paper brings across data that is utilized in the Bring Your Own Device (BYOD) status collected between February and April of 2021 across Saudi Arabia. The data set was collected using questionnaires established through online mechanisms for the respondents. In the questionnaire, personal details included five questions while seven questions addressed the working model of personal mobile devices. Six questions addressed the awareness of employees bring your own device awareness for employees comprised seven questions and two questions addressed the benefits of business achievements. In the identification of suitable respondents for the research, two approaches were applied. The research demanded that the respondents be Saudi Arabian nationals and have attained 18 years. Snowball and purposive techniques were applied in the collection of information from a wide area of Saudi Arabia while employing social media approaches that include the use of WhatsApp and emails in the collection of data. The approach ensured the collection of data from 857 respondents used in the identification of the status as well as issues across the BYOD environment and accompanying solutions. The data was also used in the provision of awareness in the community through short-term courses, cyber security training and awareness programs. The results of the research are therefore applicable to the context of the Saudi Arabian country that is currently facing issues in dealing with the application of personal devices in the work environment.

Improvement of Wireless Connectivity and Efficiency in E-Healthcare Service System Using a Proxy in Body Area Device

  • Kim, Sang Kon;Kim, Tae Kon;Koh, Jinhwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.991-1013
    • /
    • 2020
  • E-health services have provided interoperability between personal health devices in personal area network, based the ISO/IEEE 11073 standard. In the healthcare system, the manager handles most agents concurrently through wireless communication. However, due to the distance limitation and the increased number of agents, it may be difficult to provide continuous connectivity. Recently, body area devices have been equipped with various applicable agents, which can even handle agents on behalf of the manager. A BAD may act as an intermediary device to increase system efficiency and performance. In this study, a device called "proxy", which can be installed as software on BAD devices, is proposed. The data measured by an agent can be sent to the proxy first, and subsequently be sent to the manager again. Agents and the manager are not aware of the proxy existence and work normally without the proxy. Furthermore, a new smart proxy and modified manager are proposed. The smart proxy acts as one agent handling measurement data from several agents, which can transmit a significant amount of data at once. The proxy and smart proxy maintain compatibility with existing devices that conform to the 20601 standard. The proposed schemes are verified and the complexities of devices are analyzed. The analysis shows no significant difference among the proxy, smart proxy, and manager. Simulations exhibit that the proposed schemes can improve the system performance.

A User Privacy Protection Scheme based on Password through User Information Virtuality in Cloud Computing (클라우드 컴퓨팅에서 패스워드기반의 사용자 정보 가상화를 통한 사용자 프라이버시 보장 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.29-37
    • /
    • 2011
  • As the area of informatization has been expanding followed by the development of information communication technology, cloud computing which can use infra sources like server, storage, and network in IT area as an efficient service whenever and wherever skyrockets. But users who use cloud computing technology may have some problems like exposure personal data, surveillance on person, and process on commercial purpose on their personal data. This paper proposes a security technique which protect user's privacy by creating imaginary user information not to be used by other people. The proposed technique virtualizes user's information as an anonymity value not to let other people know user's identity by combining PIN code with it and guarantees user's anonymity. Also it can manage and certificate personal information that is important in cloud computing, so that it can solve security problem of cloud computing which centers all informations. Therefore this paper can assist upgrading of the level of information of poor SMBs through safe use of cloud computing.

  • PDF

Time-Slotted Scheduling Schemes for Multi-hop Concurrent Transmission in WPANs with Directional Antenna

  • Bilal, Muhammad;Kang, Moonsoo;Shah, Sayed Chhattan;Kang, Shin-Gak
    • ETRI Journal
    • /
    • v.36 no.3
    • /
    • pp.374-384
    • /
    • 2014
  • To achieve high-speed (giga-bit) connectivity for short-range wireless multimedia applications, the millimeter-wave (mmWave) wireless personal area networks with directional antennas are gaining increased interest. Due to the use of directional antennas and mmWave communications, the probability of non-interfering transmissions increases in a localized region. Network throughput can be increased immensely by the concurrent time allocation of non-interfering transmissions. The problem of finding optimum time allocation for concurrent transmissions is an NP-hard problem. In this paper, we propose two enhanced versions of previously proposed multi-hop concurrent transmission (MHCT) schemes. To increase network capacity, the proposed schemes efficiently make use of the free holes in the time-allocation map of the MHCT scheme; thus, making it more compact.

Adaptive Bandwidth Allocation for QoS Guaranteed VLC Based WPAN

  • Saha, Nirzhar;Mondal, Ratan Kumar;Jang, Yeong Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.8
    • /
    • pp.719-724
    • /
    • 2013
  • Visible light communication based wireless personal area network (WPAN) has recently remained in the center of attention, as it shows a lot of promise to a be a perfect replacement for the contemporary Radio frequency (RF) communication at least in the indoor environment. A commercially deployable VLC based WPAN must support diverse traffic requirement for different kinds of service. In this paper, we have proposed an innovative bandwidth allocation scheme for VLC based WPAN. We wish to allocate bandwidth adaptively for users in a network where bandwidth for each user is allocated scalably. Our aim is to allow maximum number of users in a VLC based WPAN where each user is guaranteed their required QoS. The simulation results justify that the proposed scheme is better than the conventional scheme.

A Study of the Measurement of Personal Activity on Online Marketing: Focus on SNS (온라인 마케팅 활동성 측정에 대한 연구- SNS 사용자 활동을 중심으로)

  • Kim, Sooeun;Kim, Eungdo
    • Knowledge Management Research
    • /
    • v.16 no.3
    • /
    • pp.81-102
    • /
    • 2015
  • With the rapid development of digital media, there has been a huge change in a way of communication, a process of information diffusion and a role of traditional media. Not like mass media, social media enables users to generate and tap into the opinions of a larger world. From that reason, social media is impacting marketing strategies. However, still social media marketing researches just focus on case study, analysis of users motivation or analysis of power user's usage pattern. Word-of-mouth has always been important especially in marketing area. In social media, word-of-mouth depends on each user that's why this research focuses on individual user's activity in SNS. I defined 4 factors (produce, diffusion, network size, activity of network size enlarge) that are effect on activity and verified hypothesis by multiple regression analysis, hierarchical regression analysis and moderated multiple regression.

A Study on Performance Analysis of IEEE 802.15.4b Noncoherent Receivers at 915MHz under Pulse Jamming (Pulse Jamming 환경 하에서 IEEE 802.15.4b 915MHz 비동기식 수신기 성능 분석에 대한 연구)

  • Lee, Sung-Yong;Cheong, Cha-Keon
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.296-298
    • /
    • 2009
  • In this paper, we are performance analysis of IEEE 802.15.4b LR-WAPN(Low-Rate Wireless Personal Area Network; Zigbee) system noncoherent receivers at 915MHz under Jamming. IEEE 802.15.4b concerns itself with devices at 915MHz, which employ a higher data rate of up to 250 kbps, and which use O-QPSK(Offset Quradrature Phase Shift Keying modulation with DSSS(Direct Sequence Spread Spectrum). Communication between devices can still be hampered by the presence of interferers outside the network, whether the interference be intentional or not. Hence the receivers can not have stable receiving condition due to worse BER. To solve this problem, we present a mere stabilized receiver system of using noncoherent detection. In this paper, we look instead at the effect of jamming, i.e. intentional interference, on the BER performance of IEEE 802.15.4 devices.

  • PDF

A Lightweight Authentication Mechanism for Acknowledgment in LR-WPAN Environment

  • Heo, Joon;Hong, Choong-Seon;Choi, Sang-Hyun
    • Annual Conference of KIPS
    • /
    • 2005.11a
    • /
    • pp.973-976
    • /
    • 2005
  • In IEEE 802.15.4 (Low-Rate Wireless Personal Area Network) specification, a successful reception and validation of a data or MAC command frame can be confirmed with an acknowledgment. However, the specification does not support security for acknowledgment frame; the lack of a MAC covering acknowledgments allows an adversary to forge an acknowledgment for any frame. This paper proposes an identity authentication mechanism at the link layer for acknowledgment frame in IEEE 802.15.4 network. With the proposed mechanism there is only three bits for authentication, which can greatly reduce overhead. The encrypted bit stream for identity authentication will be transmitted to device by coordinator within association process. Statistical method indicates that our mechanism is successful in handling MAC layer attack.

  • PDF