• Title/Summary/Keyword: Radio Policy

Search Result 190, Processing Time 0.032 seconds

Trends in Low Altitude Small Drone Identification Technology and Standardization (저고도 소형드론 식별 기술 및 표준화 동향)

  • Kang, K.M.;Park, J.C.;Choi, S.N.;Oh, J.H.;Hwang, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.6
    • /
    • pp.164-174
    • /
    • 2019
  • This article presents low altitude small drone identification trends at home and abroad. To reduce the dysfunction caused by the proliferation of drones worldwide, there is a growing interest in remote identification technologies that can identify the basic information of the drone. First, this article introduces policy trends in major countries. US, Europe, and China have recently provided recommendations regarding technologies available for the remote identification and tracking of a drone. Next, standardization activities on identification communications and identification systems are introduced. For this, standards organizations for the small drone identification, such as the International Organization for Standardization, IEEE 802, Radio Technical Commission for Aeronautics, International Civil Aviation Organization, and $3^{rd}$ Generation Partnership Project, are investigated. Finally, drone identification technology trends are introduced. In the US and Europe, various drone identification technologies have been studied to identify a drone owner and drone registration information with a drone identifier. In South Korea, drone identification technology is still in its infancy, whereas drone detection and physical counterattack technologies are somewhat more developed. As such, major drone manufacturers are also currently studying and developing drone identification systems.

A Study on Terrestrial UHDTV Broadcasting and Construction of Direct Reception Environment by DVB-T2 (DVB-T2기반으로 지상파 UHDTV방송과 직접수신환경 구축 연구)

  • Park, Sung-Kyu;Jo, Young-Joon;Kim, Dong-Woo;Park, Goo-Man
    • Journal of Broadcast Engineering
    • /
    • v.18 no.4
    • /
    • pp.572-588
    • /
    • 2013
  • In this paper, 4K-UHDTV or 8K-UHDTV and UHD-3DTV that the next generation broadcasting implementation and the possibility of direct receiving environment construction is analyzed on the terrestrial broadcasting. Particularly, we investigated the possibility by analyzing the previous and related works with regard to UHDTV transmission by DVB-T2 that is one of the best commercialized transmission mode. In order that the UHDTV broadcasting succeeds once again after completion of digital terrestrial switch over at the end of 2012, the ultra high resolution image transfer is important. However, the direct, the indoor and ubiquitous receiving environment is important in not only TV but also the personal type multimedia terminal in the sense of UHDTV service penetration. Therefore, in this paper, by using SFN and high error-correcting mode in DVB-T2 standard, the efficient frequency utilization and effective reception environment construction is illustrated. Particularly, SFN network constitution by 2 mutually different frequencies including the VHF bandwidth and UHF band, and etc. is shown. And the method that builds the free wireless receive environment by using SFN low power radio repeater and for home use gap filler is proposed. And the effect and frequency amount required are presented, when UHDTV broadcasting use 10MHz bandwidth.

Recent Clanges in Contraceptive Use in Korea (최근의 가족계획실태와 전망)

  • 조남훈;이임전
    • Korea journal of population studies
    • /
    • v.8 no.1
    • /
    • pp.118-138
    • /
    • 1985
  • This paper is aimed to analyse the recent changes in family planning as a step in an evaluation of the results of the population control policy which has been strenuously pursued by the government since December 1981. The data used in this analysis comes from the 1985 national fertility and family planning survey conducted by the Korea Institute for Population and Health (KIPH) in May 1985. According to the 1985 survey data, there have been great changes in both the contraceptive practice and fertility rates since the strengthening of the government's population control policy in 1 981. The contraceptive practice rate for married women aged 15-44 has increased from 57.7% in 1982 to 70.3% in 1985, an increase of 12.6% points in the short span of only 3 years. During the same period, the total fertility rate has declined from 2.7 in 1982 to the population replacement level which was planned to achieve by 1 988. More than 80% of women aged over 30 or with two children or more are practicing contraception, while the practice rates of women with 0-1 children are 14.0% and 45.1% respectively. The survey has revealed that the increase of contraceptive practice rate during 1982-1985 has mainly attributed to the high acceptance of sterilization procedures which practice rate of the married women has increased from 28.1% to 40.3% for the period. Also, the survey data shows that 24.7% of those women with only one child is practicing contraception for thepurpose of fertility termination. The government, taking into account of rapid changes in contraceptive practice and fertility rates, is formulating a population plan during the sixth fiveyear economic and social development plan (1987-1991) to achieve 1% ofpopulation growth rate by 1993, which was planned to realize by 2000. In order to meet this demographic goal, the existing population control policy measures should be improved to be suited to the recent contraceptive use and fertility changes. From this standpoint, the following considerations should be put forth; 1) improvement of the current program management systems including target allocation and evaluation schems for recruiting new acceptors in the young 20s groups to use contraceptives for birth spacing and to increase high continuation rates through the strengthening of follow-up services for the acceptors, 2) increase of self-supporting contraceptive users by promoting commercial advertisements on contraceptives through mass media including T.V. and radio, 3) development of social support policies including incentive schems, and strengthening of IE & C activities for increasing the proportion of the one-child family, 4) strengthening of population and family planning education in and out school youth, and 5) strengthening of management capabilities at the provincial and local program managers.

  • PDF

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

A Status of Technology and Policy of Nuclear Spent Fuel Treatment in Advanced Nuclear Program Countries and Relevant Research Works in Korea (선진 원자력발전국의 사용후핵연료 처리기술 및 정책현황과 우리나라의 관련연구 현황)

  • You, Gil-Sung;Choung, Won-Myung;Ku, Jeong-Hoe;Cho, Il-Je;Kook, Dong-Hak;Kwon, Kie-Chan;Lee, Won-Kyung;Lee, Eun-Pyo;Hong, Dong-Hee;Yoon, Ji-Sup;Park, Seong-Won
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.5 no.4
    • /
    • pp.339-350
    • /
    • 2007
  • Status on the spent nuclear fuel management policy and R&D plan of the major countries is surveyed. Also the prospect of the future R&D plan is suggested. Recently so-called fuel cycle nations, which have the reprocess policy of the spent fuel, announced new spent fuel management policy based on the advanced fuel cycle technology. The policy is focused to transmute highly radioactive material and material having a very long half-life, and to recycle the Pu and U contained in the spent fuel. In this way the radio-foxily of the spent fuel as well as the amount of the high level waste to be eventually disposed can greatly be reduced. Most of countries selected the wet process as a primary option for the treatment of the spent fuel since the advanced wet process, which is based on the existing PUREX process, looks more feasible as compared with the dry process. The wet process, however, is much more sensitive in terms of proliferation-resistance compared with the dry process. The pure Pu can easily be obtained by simply modifying the process. On the other hand the pure Pu can not be extracted in the dry process based on the high temperature molten salt process such as a pyroprocess. Even though the pyroprocess technology is very premature, it has a great merit. Thus it is necessary for Korea to have a long term strategy for pursuing a spent fuel treatment technology with a proliferation resistance and a great merit for the GEN-IV fuel cycles. Pyroprocess is one of the best candidates to satisfy these purposes.

  • PDF

Improved Trilateration Method on USN for reducing the Error of a Moving Node Position Measurement (무선센서네트워크에서 삼변측량법 기반 이동노드 위치 오차를 줄이는 탐색기법)

  • Mun, Hyung-Jin;Jeong, Hee-Young;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.301-307
    • /
    • 2016
  • The location measurement technique of moving worker in dangerous areas, is necessary for safety in the mines, basements, warehouses, etc. There are various measurement techniques about moving node of position in a restricted environment. Trigonometric Method, one of measurement techniques, is commonly used because of its easiness. However, errors occur frequently when measuring distance and position due to radio interference and physical disability with measuring instruments. This paper proposed a method which is more accurate and shows reduced margin of error than existing trigonometric method by recalculating distance between Anchor and moving node with various measuring instruments. By adding Anchor when calculating distance and position of moving node's estimated point, suggested technique obtains at least 41% efficiency compared to existing method.

A Study on Signature-based Wireless Intrusion Detection Systems (시그니처 기반의 무선 침입 탐지 시스템에 관한 연구)

  • Park, Sang-No;Kim, A-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1122-1127
    • /
    • 2014
  • WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.

LBS 응용 모바일 서비스의 사용 요인에 관한 실증적 연구

  • Im, Gi-Heung
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.107-143
    • /
    • 2005
  • Mobile service that geography, position by development of space Information Technology and technology of communications, space are various to us now becoming limelight as point contents and infra information that customers do demand based on radio superhigh speed authentication net on highly information society by offer infringement problem about individual's privacy or information by political and scientific interest be injured. Purpose of this study grasps use factor of LBS application Mobile service, and it is that analyze actual proof through questionnaire to grasp whether some relation is with value and action determination that is felt of LBS application Mobile service. Distributed all question of 190 copies but disk floret inclination did valid data 171 that clear question and omission remove a lot of questions by type of study among questionnaire of collected 182 wealths. Analyzed factor analysis and authoritativeness to search validity and confidence of questionnaire and used single regression analysis and multiple regression analysis for hypothetical verification. According to verification result, Mobile service that apply position base service usefulness and system quality, adaptedness of Mobile service that apply position base service by leading person affecting in use, acted for connection healthy and felt value is important factor immediately. Usability and social effect, felt expense, privacy did not appear by leading person that keep in mind in this study. Is been related with step that Mobile service that apply position base service is placed. That is, as present childhood, a person who have experience that use service to look for friend is few and usability fairly in last in wide application boundary and this very important person was removed finally in model. This study has sense in terms of study systematically about LBS application service use leading person that is getting into the spotlight worldwide among Mobile service that is injured newly.

  • PDF

A Case Study on the differentiation strategy of University Advertising (대학광고의 차별화 전략에 관한 사례연구 -남서울대학교의 N+캠페인 광고를 중심으로-)

  • Yoon, Il-Ki
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.311-321
    • /
    • 2012
  • This study tries to find the possibility of differentiation strategy and looks into N+ advertising campaign of NAMSEOUL University that has been doing since 2011. N+ advertising campaign contains the meaning of educating leaders based on the foundation concept of NAMSEOUL University and develops consistent creativities through medium such as radio advertising, print advertising, on-line advertising and outdoor advertising. On the first of stage, the campaign develops the start and the meaning of N+ and organizes to get sympathy from target customers on the second stage. Nowadays, there are many competitions among universities to promote students. In this situation, the N+ advertising campaign of NAMSEOUL University is differentiate approach. It's also promotion for external publics to introduce the identity of University and effect for inducement of internal publics with pride and unity. Moreover, it suggests to universities what they have to consider.

Universal and Can be Applied Wireless Channel Assignment Algorithm (범용 적용이 가능한 무선채널할당알고리즘)

  • Heo, Seo-Jung;Son, Dong-Cheul;Kim, Chang-Suk
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.375-381
    • /
    • 2012
  • If a mobile station requests a channel allocation in its mobile networks, the switching center assigns a channel to a mobile station that belongs to each base station. There are three kinds of channel allocation schemes; a fixed channel allocation, a dynamic channel allocation and a hybrid combination of these two forms. In assigning a good frequency, it is our intention to provide quality service to our customers as well as to use resources efficiently. This paper proposes methods of assigning frequencies that minimize interference between channels and that also minimize the amount of searching time involved. In this paper, we propose an algorithm to per specific equipment, regardless of the number of channels that can be used as a general-purpose system, such as base stations, control stations, central office model is proposed, the existing operators manner similar to the fixed channel allocation based statistics and assigned when the conventional method and the improved method is proposed. Different ways and compared via simulations to verify the effectiveness of the proposed approach.