• Title/Summary/Keyword: Protocol Design

Search Result 2,595, Processing Time 0.025 seconds

A study on the Energy resource in School Buildings with the Changes of Educational Facilities Standard (교육 시설기준 변화에 따른 학교건축물의 에너지원 변화에 관한 연구)

  • Kim, Tae-Woo;Lee, Kang-Guk;Hong, Won-Hwa
    • KIEAE Journal
    • /
    • v.10 no.6
    • /
    • pp.73-80
    • /
    • 2010
  • Since the Korean War, Korea has experienced modernization. The population increase by baby booming has asked for more space for educational facilities. In such a situation, the purpose of educational facilities was to accommodate continuously increasing students, rather than seeking for quantitative demands. In addition, in accordance with social changes, educational shifts were required. After the revision of the seventh national curriculum in education in 1997, the school buildings became varied. The design of buildings in accordance with educational curriculum has been improved, but still lack of forming comfortable environment and considering energy efficiency in school buildings. For the improvement of educational environments, educational media such as TV and computers have been provided, and energy systems, including heating and cooling systems, has been continuously increased. As a result, it appeared that energy use in school buildings and facilities has been steadily increased and that the structure of energy consumption has been also changed, especially with regard to electricity use. Living in the 21st century, human beings face global environmental issues, such as global warming, geographical climate changes, and ozone destruction that are the consequences of fossil energy use. Therefore, even in industrial areas, considering a counterplan for low energy use is being paid attention. Starting with Kyoto Protocol in 1992, people try to decrease carbon dioxide and to develop alternative energies (i.e. natural energy); for example, solar energy, wind force, terrestrial heat, and water power. Advanced countries already set up a criterion for $CO_2$ decrease ranging from office buildings to residential houses and also propose alternatives for the $CO_2$ decrease. However, there is no such a plan for low energy use and $CO_2$ decrease in school facilities, and any research on the actual conditions was not accomplished. Thus, this study examines energy demand in classrooms that take up a large portion of energy demand in school building structure.

Algorithm Design and Implementation for Safe Left Turn at an Intersection Based on Vehicle-to-Vehicle Communications (교차로에서의 안전 좌회전을 위한 차량간 통신 기반 알고리즘 설계 및 구현)

  • Seo, Hyun-Soo;Kim, Hyo-Un;Noh, Dong-Gyu;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.165-171
    • /
    • 2013
  • WAVE(Wireless Access in Vehicular Environments) is a representative V2V communication protocol and its standards of MAC and PHY parts except for security were published. In order to control traffic flow and ensure driver's safety using V2V communication, various projects are conducting. In particular, safety application has been researched. Therefore, in this paper, we designed the safety application algorithm, which informs a driver of the dangerous status when driver tries to turn left in an intersection and we also implemented the algorithm. Proposed algorithm configures a model for a host vehicle and a vehicle coming in opposite lane and in case that there is collision hazard it provides warning message to driver by using HMI. In order to evaluate the proposed algorithm's performance, we configured the test bed using test vehicles and we tested the algorithm on proving ground with the composed test scenarios. As test results, our system showed excellent performance. If the infrastructures for V2I communications are constructed, we will optimize our system more precisely and stably.

A study on the Implementation of Wireless Sensor Network for Wireless Home Networking (무선 홈네트웤을 위한 WSN에 관한 연구)

  • Jeon, Dong-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.6
    • /
    • pp.1337-1342
    • /
    • 2012
  • In recent years, many researches in Home Networking are being progressed actively. Most of techniques for Home Networking are based on wired but the technique for wireless connection is also needed. This paper focuses on wireless connection in Home Networking. Of many of wireless technologies, such as Wireless LAN, Bluetooth, or HomeRF, we especially propose to apply the new technique called Wireless Sensor Network. We present hardware and protocol stack design consideration for wireless sensor node and wireless sensor network, and then we present how to apply wireless sensor network to Home Networking and how to constitute Wireless Home-Networking with a variety of sensor nodes. Finally, we introduce the wireless sensor node system designed by us and conclude this paper.

Design of short-term forecasting model of distributed generation power for wind power (풍력 발전을 위한 분산형 전원전력의 단기예측 모델 설계)

  • Song, Jae-Ju;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.211-218
    • /
    • 2014
  • Recently, wind energy is expanding to combination of computing to forecast of wind power generation as well as intelligent of wind powerturbine. Wind power is rise and fall depending on weather conditions and difficult to predict the output for efficient power production. Wind power is need to reliably linked technology in order to efficient power generation. In this paper, distributed power generation forecasts to enhance the predicted and actual power generation in order to minimize the difference between the power of distributed power short-term prediction model is designed. The proposed model for prediction of short-term combining the physical models and statistical models were produced in a physical model of the predicted value predicted by the lattice points within the branch prediction to extract the value of a physical model by applying the estimated value of a statistical model for estimating power generation final gas phase produces a predicted value. Also, the proposed model in real-time National Weather Service forecast for medium-term and real-time observations used as input data to perform the short-term prediction models.

A Design on Security Model of Domestic Internet-based Broadcasting Service (국내 인터넷기반 방송서비스의 보안 모델 설계)

  • Seo, Hee-Suk;Kim, Sung-Jun;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.183-190
    • /
    • 2012
  • Internet Protocol Television(IPTV) is the use of an IP broadband network to deliver television (cable TV type) services to the end user. Traditional telecommunications service providers as well as alternate service providers and Internet service providers can utilize their IP networks (and broadband consumer access) to deliver broadcast TV, Video on Demand (VOD) and other Internet services to the consumer. As digital technologies progress, illegal copy and redistribution of IPTV content become easier and simpler. Therefore it is required to protect IPTV content or service. In this paper, we analyze the security threats and requirements. We also discuss related issues and solutions for IPTV.

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

Design The User Authentication Framework Using u-health System (u-health 시스템을 이용한 사용자 인증 프레임워크 설계)

  • Choo, Yeun-Su;Jin, Byung-Wook;Park, Jae-Pyo;Jun, Moon-Seog
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.219-226
    • /
    • 2015
  • OTP(One Time Password) is for user authentication of Internet banking and users should carry their security card or OTP generator to use OTP. If they lost their security card or OTP generator, there is at risk for OTP leak. This paper suggests a new User Authentication Framework using personal health information from diverse technology of u-Health. It will cover the problem of OTP loss and illegal reproduction A User Authentication Framework is worthy of use because it uses various combinations of user's physical condition which is inconstant. This protocol is also safe from leaking information due to encryption of reliable institutes. Users don't need to bring their OTP generator or card when they use bank, shopping mall, and game site where existing OTP is used.

Design and Implementation of MAC Engine for Next-Generation WLAN (차세대 무선랜 구현을 위한 MAC 엔진 설계 및 구현)

  • Lee, Yeong-Gon;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.6
    • /
    • pp.39-47
    • /
    • 2009
  • This paper presents implementation of two types of the 802.11 MAC engine for the next generation WLAN, 802.11n. The first version of MAC engine consists of hardwired logic and embedded firmware. Hardwired logic includes Tx block, Rx block, Backoff block, and ChannelManage block. Embedded firmware contains Protocol Control block, MLME block, and MSDU processing block. The first version has a time-critical fault during the atomic transmission caused by software overhead, so it can not be applied to 802.11n MAC. For that reason, the second version has additional blocks with hardwired logic modules to reduce software overhead of the first version. This enhanced version has 73Mbps throughput and it is expected to be further improved up to 129 Mbps with frame aggregation which is one of the key additional features of 802.11n. As a result, the second version of MAC engine can be applied to 802.11n MAC.

A Study on Performance of Content Store Replacement Algorithms over Vehicular CCN (VCCN에서 Content Store 교체 알고리즘의 성능에 관한 연구)

  • Choi, Jong-In;Kang, Seung-Seok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.495-500
    • /
    • 2020
  • VANET (Vehicular Ad Hoc Network), an example of an ad hoc vehicular networks, becomes one of the popular research areas together with the self-driving cars and the connected cars. In terms of the VANET implementation, the traditional TCP/IP protocol stack could be applied to VANET. Recently, CCN (Content Centric Networking) shows better possibility to apply to VANET, called VCCN (VANET over CCN). CCN maintains several data tables including CS (Content Store) which keeps track of the currently requested content segments. When the CS becomes full and new content should be stored in CS, a replacement algorithm is needed. This paper compares and contrasts four replacement algorithms. In addition, it analyzes the transmission characteristics in diverse network conditions. According to the simulation results, LRU replacement algorithm shows better performances than the remaining three algorithms. In addition, even the size of CS is small, the network maintains a reasonable transmission performance. As the CS size becomes larger, the transmission rate increases proportionally. The transmission performance decreases when the network is crowded as well as the number of transmission hops becomes large.

Collision Avoidance Power Control of Carrier Sensing Zone for Energy Efficiency in Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율을 위한 반송파 감지지역의 충돌방지 전력제어)

  • Kim, Chang-Bok;Kim, Nam-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.53-60
    • /
    • 2011
  • In Wireless Sensor Networks, IEEE 802.11 happen unnecessary energy consume because of packet transmission using maximum power between sensor node. The BASIC scheme is to use maximum transmission power for RTS-CTS and minimum required transmission power so as to high energy efficiency for DATA-ACK. However BASIC scheme may degrade network throughput with collision of ACK packet by node in carrier sensing zone and may result in higher energy consumption than when using IEEE 802.11 without power control. Existing PCM(Power Control MAC) scheme is to use DATA packet transmission method by periodically maximum power level so as to sensing DATA packet transmit in carrier sensing zone of transmission node, and this method can avoid collision of ACK packet. This paper present problem by energy efficiency of PCM scheme, and design some more improved PCM scheme.