• Title/Summary/Keyword: Radio Environment

Search Result 1,188, Processing Time 0.026 seconds

Mobile Contents Transformation System Research for Personalization Service (개인화 서비스를 위한 모바일 콘텐츠 변환 시스템 연구)

  • Bae, Jong-Hwan;Cho, Young-Hee;Lee, Jung-Jae;Kim, Nam-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.119-128
    • /
    • 2011
  • The Sensor technology and portable device capability able to collect recent user information and the information about the surrounding environment haven been highly developed. A user can be made use of various contents and the option is also extending with this technology development. In particular, the initial portable device had simply a call function, but now that has evolved into 'the 4th screen' which including movie, television, PC ability. also, in the past, a portable device to provided only the services of a SMS, in recent years, it provided to interactive video service, and it include technology which providing various contents. Also, it is rising as media which leading the consumption of contents, because it can be used anytime, anywhere. However, the contents available for the nature of user's handheld devices are limited. because it is very difficult for making the contents separately according to various device specification. To find a solution to this problem, the study on one contents from several device has been progressing. The contents conversion technology making use of the profile of device out of this study comes to the force and profile study has been progressing for this. Furthermore, Demand for a user is also increased and the study on the technology collecting, analyzing demands has been making active progress. And what is more, Grasping user's demands by making use of this technology and the study on the technology analyzing, providing contents has been making active progress as well. First of all, there is a method making good use of ZigBee, Bluetooth technology about the sensor for gathering user's information. ZigBee uses low-power digital radio for wireless headphone, wireless communication network, and being utilized for smart energy, automatic home system, wireless communication application and wireless sensor application. Bluetooth, as industry standards of PAN(Personal Area Networks), is being made of use of low power wireless device for the technology supporting data transmission such as drawing file, video file among Bluetooth device. With analyzing the collected information making use of this technology, it utilizes personalized service based on network knowledge developed by ETRI to service contents tailor-made for a user. Now that personalized service builds up network knowledge about user's various environments, the technology provides context friendly service constructed dynamically on the basis of this. The contents to service dynamically like this offer the contents that it converses with utilizing device profile to working well. Therefore, this paper suggests the system as follow. It collects the information, for example of user's sensitivity, context and location by using sensor technology, and generates the profile as a means of collected information as sensor. It collects the user's propensity to the information by user's input and event and generates profile in the same way besides the gathered information by sensor. Device transmits a generated profile and the profile about a device specification to proxy server. And proxy server transmits a profile to each profile management server. It analyzes profile in proxy server so that it selects the contents user demand and requests in contents server. Contents server receives a profile of user portable device from device profile server and converses the contents by using this. Original source code of contents convert into XML code using the device profile and XML code convert into source code available in user portable device. Thus, contents conversion process is terminated and user friendly system is completed as the user transmits optimal contents for user portable device.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

A Simulation-Based Investigation of an Advanced Traveler Information System with V2V in Urban Network (시뮬레이션기법을 통한 차량 간 통신을 이용한 첨단교통정보시스템의 효과 분석 (도시 도로망을 중심으로))

  • Kim, Hoe-Kyoung
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.5
    • /
    • pp.121-138
    • /
    • 2011
  • More affordable and available cutting-edge technologies (e.g., wireless vehicle communication) are regarded as a possible alternative to the fixed infrastructure-based traffic information system requiring the expensive infrastructure investments and mostly implemented in the uninterrupted freeway network with limited spatial system expansion. This paper develops an advanced decentralized traveler information System (ATIS) using vehicle-to-vehicle (V2V) communication system whose performance (drivers' travel time savings) are enhanced by three complementary functions (autonomous automatic incident detection algorithm, reliable sample size function, and driver behavior model) and evaluates it in the typical $6{\times}6$ urban grid network with non-recurrent traffic state (traffic incident) with the varying key parameters (traffic flow, communication radio range, and penetration ratio), employing the off-the-shelf microscopic simulation model (VISSIM) under the ideal vehicle communication environment. Simulation outputs indicate that as the three key parameters are increased more participating vehicles are involved for traffic data propagation in the less communication groups at the faster data dissemination speed. Also, participating vehicles saved their travel time by dynamically updating the up-to-date traffic states and searching for the new route. Focusing on the travel time difference of (instant) re-routing vehicles, lower traffic flow cases saved more time than higher traffic flow ones. This is because a relatively small number of vehicles in 300vph case re-route during the most system-efficient time period (the early time of the traffic incident) but more vehicles in 514vph case re-route during less system-efficient time period, even after the incident is resolved. Also, normally re-routings on the network-entering links saved more travel time than any other places inside the network except the case where the direct effect of traffic incident triggers vehicle re-routings during the effective incident time period and the location and direction of the incident link determines the spatial distribution of re-routing vehicles.

Recent Developments in Space Law (우주법(宇宙法)의 최근동향(最近動向))

  • Choi, June-Sun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.223-243
    • /
    • 1989
  • The practical application of modern space science and technology have resulted in many actual and potential gains of mankind. These successes have conditioned and increased the need for a viable space law regime and the challenge of space has ultimately led to the formation of an international legal regime for space. Space law is no longer a primitive law. It is a modern law. Yet, in its stages of growth, it has not reached the condition of perfection. Therefore, under the existing state of thing, we could carefully say that the space law is one of the most newest fields of jurisprudence despite the fact that no one has so far defined it perfectly. However, if space law can be a true jurisprudential entity, it must be definable. In defining the space law, first of all, the grasp of it's nature iis inevitable. Although space law encompasses many tenets and facets of other legal discriplines, its principal nature is public international law, because space law affects and effects law relating intercourse among nations. Since early 1960s when mankind was first able to flight and stay in outer space, the necessity to control and administrate the space activities of human beings has growingly increased. The leading law-formulating agency to this purpose is the United Nation's ad hoc Committee on Peaceful Uses of Outer Space("COPUOS"). COPUOS gave direction to public international space law by establishing the 1963 Declaration of Legal Principles Governing the Activities of the States in the Exploration and Use of Outer Space("1963 Declaration"). The 1963 Declaration is very foundation of the five international multilateral treaties that were established successively after the 1963 Declaration. The five treaties are as follows: 1) The Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer Space including Moon and other Celestial Bodies, 1967. 2) The Agreement on the Rescue of Astronauts, the Return of Astronauts, and the Return of Objects Launched into Outer Space, 1968. 3) The Convention on International Liability for Damage Caused by Space Objects, 1972. 4) The Convention on Registration of Objects Launched into Outer Space, 1974. 5) The Agreement Governing Activities of States on the Moon and Other Celestial Bodies: Moon Treaty, 1979. The other face of space law is it's commercial aspect. Space is no longer the sole domination of governments. Many private enterprise have already moved directly or indirectly into space activities in the parts such as telecommunications and space manufacturing. Since space law as the public international law has already advanced in accordance with the developments of space science and technology, there left only a few areas untouched in this field of law. Therefore the possibility of rapid growth of space law is expected in the parts of commerical space law, as it is, at this time, in a nascent state. The resources of the space environment are also commercially both valuable and important since the resources include the tangible natural resources to be found on the moon and other celestial bodies. Other space-based resources are solar energy, geostationary and geosynchronous orbital positions, radio frequencies, area possibly suited to human habitations, all areas and materials lending themselves to scientific research and inquiry. Remote sensing, space manufacturing and space transportation services are also another potential areas in which commercial. endeavors of Mankind can be carried out. In this regard, space insurance is also one of the most important devices allowing mankind to proceed with commercial space venture. Thus, knowlege of how space insurance came into existence and what it covers is necessary to understand the legal issues peculiar to space law. As a conclusion the writer emphasized the international cooperation of all nations in space activities of mankind, because space commerce, by its nature, will give rise many legal issues of international scope and concern. Important national and world-community interests would be served over time through the acceptance of new international agreements relating to remote sencing, direct television broadcasting, the use of nuclear power sources in space, the regularization of the activities of space transportation systems. standards respecting contamination and pollution, and a practical boundary between outer space and air space. If space activity regulation does not move beyond the national level, the peaceful exploration of space for all mankind will not be realized. For the efficient regulation on private and governmental space activities, the creation of an international space agency, similar to the International Civil Aviation Organization but modified to meet the needs of space technology, will be required. But prior to creation of an international organization, it will be necessary to establish, at national level, the Office of Air and Space Bureau, which will administrate liscence liscence application process, safety review and sale of launch equipment, and will carry out launch service.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Study of Quality Control of Traditional Wine Using IT Sensing Technology (IT 센싱 기술을 이용한 전통주 발효의 품질관리 연구)

  • Song, Hyeji;Choi, Jihee;Park, Chan-Won;Shin, Dong-Beom;Kang, Sung-Soo;Oh, Sung Hoon;Hwang, Kwontack
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.44 no.6
    • /
    • pp.904-911
    • /
    • 2015
  • The objective of this study was to investigate the quality characteristics of traditional wine using an radio-frequency identification (RFID) system annexed to a fermenter. In this study, we proposed an RFID-based data transmission scheme for monitoring fermentation of traditional alcoholic beverages. The pH, total acidity, total sugar, soluble sugar, free sugar, alcohol content, and organic acids of were investigated and subjected to fermentation of traditional alcoholic beverages three times. The pH ranged from 7.98, 7.95, and 7.68 at day 0, decreased drastically to 3.31~2.96 at day 2, and then slowly increased to the end point, finally reaching 3.34 at day 20. Acidity tended to increase quickly with time, especially for all samples after day 2. The fermentation environment induced a sudden increase acidity in reactants and indicated a low pH. The total sugars during fermentation quickly decreased to the range of 20.3, 22.43, and 19.2% at day 2, and the slope of reduction steadily decreased to 5.1, 6.1, and 4.8% at day 10. On the other hand, the alcohol content showed the reverse trend as total sugars. The alcohol content also showed the same pattern as total acids, showing the highest alcohol content of 17.3% (v/v) on day 20. In this study on traditional wine fermentation using an RFID system, we showed that pH, soluble sugar, and alcohol content can be adopted as key indicators for quality control and standardization of traditional wine manufacturing.

Evaluation of Antenna Pattern Measurement of HF Radar using Drone (드론을 활용한 고주파 레이다의 안테나 패턴 측정(APM) 가능성 검토)

  • Dawoon Jung;Jae Yeob Kim;Kyu-Min Song
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.35 no.6
    • /
    • pp.109-120
    • /
    • 2023
  • The High-Frequency Radar (HFR) is an equipment designed to measure real-time surface ocean currents in broad maritime areas.It emits radio waves at a specific frequency (HF) towards the sea surface and analyzes the backscattered waves to measure surface current vectors (Crombie, 1955; Barrick, 1972).The Seasonde HF Radar from Codar, utilized in this study, determines the speed and location of radial currents by analyzing the Bragg peak intensity of transmitted and received waves from an omnidirectional antenna and employing the Multiple Signal Classification (MUSIC) algorithm. The generated currents are initially considered ideal patterns without taking into account the characteristics of the observed electromagnetic wave propagation environment. To correct this, Antenna Pattern Measurement (APM) is performed, measuring the strength of signals at various positions received by the antenna and calculating the corrected measured vector to radial currents.The APM principle involves modifying the position and phase information of the currents based on the measured signal strength at each location. Typically, experiments are conducted by installing an antenna on a ship (Kim et al., 2022). However, using a ship introduces various environmental constraints, such as weather conditions and maritime situations. To reduce dependence on maritime conditions and enhance economic efficiency, this study explores the possibility of using unmanned aerial vehicles (drones) for APM. The research conducted APM experiments using a high-frequency radar installed at Dangsa Lighthouse in Dangsa-ri, Wando County, Jeollanam-do. The study compared and analyzed the results of APM experiments using ships and drones, utilizing the calculated radial currents and surface current fields obtained from each experiment.

SANET-CC : Zone IP Allocation Protocol for Offshore Networks (SANET-CC : 해상 네트워크를 위한 구역 IP 할당 프로토콜)

  • Bae, Kyoung Yul;Cho, Moon Ki
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.87-109
    • /
    • 2020
  • Currently, thanks to the major stride made in developing wired and wireless communication technology, a variety of IT services are available on land. This trend is leading to an increasing demand for IT services to vessels on the water as well. And it is expected that the request for various IT services such as two-way digital data transmission, Web, APP, etc. is on the rise to the extent that they are available on land. However, while a high-speed information communication network is easily accessible on land because it is based upon a fixed infrastructure like an AP and a base station, it is not the case on the water. As a result, a radio communication network-based voice communication service is usually used at sea. To solve this problem, an additional frequency for digital data exchange was allocated, and a ship ad-hoc network (SANET) was proposed that can be utilized by using this frequency. Instead of satellite communication that costs a lot in installation and usage, SANET was developed to provide various IT services to ships based on IP in the sea. Connectivity between land base stations and ships is important in the SANET. To have this connection, a ship must be a member of the network with its IP address assigned. This paper proposes a SANET-CC protocol that allows ships to be assigned their own IP address. SANET-CC propagates several non-overlapping IP addresses through the entire network from land base stations to ships in the form of the tree. Ships allocate their own IP addresses through the exchange of simple requests and response messages with land base stations or M-ships that can allocate IP addresses. Therefore, SANET-CC can eliminate the IP collision prevention (Duplicate Address Detection) process and the process of network separation or integration caused by the movement of the ship. Various simulations were performed to verify the applicability of this protocol to SANET. The outcome of such simulations shows us the following. First, using SANET-CC, about 91% of the ships in the network were able to receive IP addresses under any circumstances. It is 6% higher than the existing studies. And it suggests that if variables are adjusted to each port's environment, it may show further improved results. Second, this work shows us that it takes all vessels an average of 10 seconds to receive IP addresses regardless of conditions. It represents a 50% decrease in time compared to the average of 20 seconds in the previous study. Also Besides, taking it into account that when existing studies were on 50 to 200 vessels, this study on 100 to 400 vessels, the efficiency can be much higher. Third, existing studies have not been able to derive optimal values according to variables. This is because it does not have a consistent pattern depending on the variable. This means that optimal variables values cannot be set for each port under diverse environments. This paper, however, shows us that the result values from the variables exhibit a consistent pattern. This is significant in that it can be applied to each port by adjusting the variable values. It was also confirmed that regardless of the number of ships, the IP allocation ratio was the most efficient at about 96 percent if the waiting time after the IP request was 75ms, and that the tree structure could maintain a stable network configuration when the number of IPs was over 30000. Fourth, this study can be used to design a network for supporting intelligent maritime control systems and services offshore, instead of satellite communication. And if LTE-M is set up, it is possible to use it for various intelligent services.