• Title/Summary/Keyword: Sending Area

Search Result 90, Processing Time 0.027 seconds

An LV-CAST algorithm for emergency message dissemination in vehicular networks (차량 망에서 긴급 메시지 전파를 위한 LV-CAST 알고리즘)

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.6
    • /
    • pp.1297-1307
    • /
    • 2013
  • Several multi-hop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or disseminate useful traffic information to othet vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collision at the link layer due to an excessive number of broadcast packets. To solve broadcast storm problem, we propose an RPB-MACn-based LV-CAST that is a vehicular broadcast algorithm for disseminating safety-related emergency message. The proposed LV-CAST identifies the last node within transmission range by computing the distance extending on 1 hop from the sending node of an emergency message to the next node of receiving node of the emergency message, and the last node only re-broadcasts the emergency message. The performance of LV-CAST is evaluated through simulation and compared with other message dissemination algorithms.

Video Digital Doorlock System for Recognition and Transmission of Approaching Objects (접근객체 인식 및 전송을 위한 영상 디지털 도어락 시스템 설계)

  • Lee, Sang-Rack;Park, Jin-Tae;Woo, Byoung-Hyoun;Choi, Han-Go
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.6
    • /
    • pp.237-242
    • /
    • 2014
  • Current digital door lock systems are mainly designed for users' convenience, so they have weakness in security. Thus, this paper suggests a video digital doorlock system grouped with a relay device, a server, and a digital doorlock with a camera, sensors, and communication modules, which is detecting or recognizing objects approaching to the front of the door lock system and sending images and door-opening information to users' smart devices. Experiments showed that the suggested system has 96~98% recognition rate of approaching objects and requires 17.1~23.9 seconds for transmission on average, depending on network systems. Therefore, the system is thought to have enough capability for real time security response by monitoring the front area of the doorlock system.

A Study on Asymmetrical Interactive e-Book Publication System Composition by Using DTV Broadcasting (비대칭 쌍방향 전자책 출판 DTV 방송 시스템 구성에 관한 연구)

  • 강명구;진용옥
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.327-335
    • /
    • 2001
  • In the 21st century, broadcasting, communication, and computer have been integrated due to the development of digital technology. Accordingly, to overcome the limit of respective communication media and to maintain them, their independent area shall not be classified. This study is to examine the future environment of digital TV broadcasting, to analyze customizing type service and interactive type TV technology, and to make asymmetric interactive digital TV publication broadcasting system, which is TV broadcasting in the next generation to treat visual image, sound, and various data all together by harmonizing broadcasting and communication like ISDB(Integrate Service Digital Broadcasting). In addition, to develop service on publication broadcasting with high quality, this study is to propose to develop relative devices for TV/PC reception to realize a new communication type TV publication broadcasting, by analyzing technology for producing, sending, transmitting, receiving, and saving to apply to customizing type interactive system and by examining its application.

  • PDF

Routing Attack Detection for Performance Enhancement of AODV Protocol In Mobile Ad Hoc Networks (모바일 Ad Hoc 네트워크에서 AODV 프로토콜의 성능 향상을 위한 라우팅 공격 탐지)

  • Lee, Jae-Young;Choi, Seung-Kwon;Lee, Byong-Rok;Kim, Sun-Chul;Sin, Byoung-Gon;Cho, Yong-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6A
    • /
    • pp.632-641
    • /
    • 2007
  • Since the mobile node acts as the router, the Mobile Ad Hoc network requires the security methods that are different from that of network of the wire environment. Also, since the total network can't be included in the transmission area of the mobile node, when one node sends the message to the other node, we need the middle node. But if the middle node is the unreliable malicious node, we can't guarantee the secure message transmission. Also, because all nodes configuring the network are the mobile nodes, they use the restricted battery capacity and the restricted resources. Therefore, because we have trouble performing the encryption that many resources are required when we sending the message, it is vulnerable to the security than the network of the wire environment. Last, because the network topology continues to change by the mobility of nodes configuring the network, we need the security measure that matches the network characteristics. We suggest the routing attack detection for performance enhancement of AODV protocol in Mobile Ad Hoc networks.

Development of PLC by using micro controller for the distributed fire alarm system (마이크로 콘트롤러를 이용한 분산형 방재 시스템용 중계기 개발)

  • Han, Kyong-Ho;Lee, Ki-Sik;Hwang, Seok-Yong;Kim, Jong-Chol
    • Proceedings of the KIEE Conference
    • /
    • 1996.07b
    • /
    • pp.1243-1247
    • /
    • 1996
  • In this paper, a small PLC system is designed and developed for the distributed building control and fire control system. It uses 8031, a 8-bit micro controller from Intel Inc. The size of the PLC is $7cm{\times}8cm$ and the PLC can accept 4 sensor inputs and drive 4 relay outputs, which operates at 24V. Multiple access of PLC by one host computer is implemented by assigning a unique 10 to each PLC, which ranges from 0 to 126. The operation starts by sending a command packet from host computer to a PLC and the PLC of the same 10 fetches the command packet by comparing the first byte of the command packet with its own 10. The PLC is programmed to perform a various functions and the function is selected by the content of the command byte, which is the second byte of the command packet. The third byte, which is the last byte, is a checksum byte. The checksum byte is the sum of the first byte and the second byte and is used to detect the communication error. Depending on the content of the command byte, PLC performs the desired function and returns the response packet back to the host computer. The response packet is also a three-byte packet, 10 byte, response byte and checksum byte. For the independent operation of PLC without being controlled by the host computer, variable length RULE data packet is sent to PLC. In case the communication line is broken, the PLC perform the independent operation by referencing the RULE data. The applicable areas are; building automation system, distributed factory automation, measurement of temperature of toxic or dangerous area.

  • PDF

A SES Alarmed Link Encryption Synchronization Method for High-speed Video Data Encryption (고속 영상데이터 암호화에 적합한 SES Alarmed 링크 암호동기 방식)

  • Kim, HyeongRag;Lee, HoonJae;Kwon, DaeHoon;Pak, UiYoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2891-2898
    • /
    • 2013
  • CCSDS Standard is widely used in international space telecommunication area. In this standard, Encryption is realized using a unique hierarchical encryption protocol and satisfied security requirements of communication channels. For synchronization, encryption sync is attached in the beginning of encrypted data. But exceptional case(timing jittering, abnormal system shutdown, etc.) is occurred, receiving equipment cannot decrypt received data. In this paper, we propose a SES Alarmed link encryption synchronization method for sending warning signal to the transmitter when some problems have been occurred during the transmission and we also suggest optimum conditions for SES Alarm signal through performance analysis.

Video Adaptation Model for User-Centric Contents Delivery in Mobile Computing (모바일 환경에서 맞춤형 콘텐츠 전달을 위한 비디오 적응성 모델)

  • Kim, Svetlana;Yoon, Yong-Ik
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.389-394
    • /
    • 2009
  • Lately the usage of multimedia equipment with small LCD displays is rapidly increasing. Although many people use devices like this, videos intended for TV or HDTV are sent to these mobile devices. Therefore cases where it is hard for the user to view the desired scenes are growing more frequent. Currently, most services simply reduce the size of the content to fit the screen when they offer it for mobile devices. However, especially with sports broadcasts, there are many areas that cannot be seen very well because it was simply reduced in size. We therefore consider this weakness and are researching how to let the user choose an area of interest and then sending it to the user in a way that fits the device. In this paper, we address the problem of video delivery and personalization. For the delivered video content, we suggest the UP-SAM User Personalized Context-Aware Service Adaptation Middleware) model that uses the video content description and MPEG-21 multimedia framework.

Design of MBB System for provide Mobility continuity in Environment IPSec (IPSec 환경에서 연속적인 이동성 제공을 위한 MBB 시스템 설계)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.478-484
    • /
    • 2008
  • When a mobile node moves, MIPv6 operates an authentication process for the new connection. These kinds of frequent binding update and authentication processes cause much traffic and delay the service. To solve this problem, PMIPv6 provides a network-based mobility protocol in order to lessen the load on a mobile node. However, when it is moved from a domain to a domain or in a domain, there still lies a need fDr a new address, so MIPv6's demerit still exists. In IPsec, too, a new negotiation should be made when it is moved to WAN(Wide Area Network). This causes load to the mobile node. In this paper suggests MBB(Make Before Break) system to eliminate disconnections or delays resulted from the address change or renegotiation for security. When the mobile node receives a CoA address, IPsec negotiation gets operated. Its identity is authenticated by sending the identifier used for the prior negotiation to CN(Correspondent Node) through the BID message suggested. After that, negotiation Bets simplified that disconnections can be eliminated, and in the IPsec negotiation, the load on the mobile node can be lessened as well; moreover, two addresses are used for the communication simultaneously, so the probability of packet loss can be reduced.

A Crew Location Recognition System for a Naval Ship by Applying Ubiquitous Technologies

  • Lee, Jin-Tae;Cho, Seong-Rak;Kim, Seong-Jeon
    • Journal of Ship and Ocean Technology
    • /
    • v.12 no.3
    • /
    • pp.26-35
    • /
    • 2008
  • Recognition of real time locations of crews for a naval ship is important, not only for the operation efficiency but also for the safety of onboard crews in the ship. More than 100 crews are dwelling in a modem naval ship and they are involved in various duties. Moreover many visitors come in and out frequently while the ship is moored in a harbor. It sometimes requires considerable time and efforts to find a person for urgent mission. It would enhance the operational efficiency if locations of onboard crews are recognized and monitored in real time. An active type RFID tag, which has a specific ID number, is distributed to each crew member, which should be carried during his stay in the ship. A number of fixed type RFID readers are to be located at the major passages of the ship, which are connected to the main computer via Local Area Network. The location of a crew would be identified by the ID number of his RFID tag and the location of the RFID reader which detected the RFID tag. A middleware is needed to process the collected data in the main computer. The data is fed to application softwares, which actually display locations of the concerned crews. The software is coded using GUI (Graphic User Interface) for better user friendliness, which has the function of storing the location history of a crew, and sending warning messages to appropriate persons, if unallowable behavior is detected. An auxiliary naval ship is selected for an experimental application study of the proposed system. It turns out that the required budget and time for the realization of the system is within the allowable limits. But complementary measures to protect the privacy of onboard crews should be considered and adopted, before the application of the system is realized.

Non-Fire Alarm Management and Customized Automatic Guidance System (비화재보 관리 및 맞춤형 자동안내 시스템)

  • Hyo-Seung Lee;Ju-Sang Lee;Woo-Jun Choi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.2
    • /
    • pp.355-360
    • /
    • 2023
  • Fire is a disaster that causes irreversible damage to many people due to personal injury and property damage. Various fire detection equipments are installed around us to detect and cope with it quickly. However, due to various problems such as artificial, environmental, and aging, fire detection equipment is activated even though it is not a actual fire, and there are many problems such as delaying the support to the necessary fire scene. In this paper, we analyze the non-fire alarm of the fire detection equipment and propose a system that enables the field staff to check the scene situation through the video as a way to prevent the mobilization due to the misinformation by checking the fire. The purpose of the present invention is to stably cope with a disaster by suggesting a customized automatic guidance system which induces a rapid evacuation by sending an evacuation guidance notification to a range of a fire occurrence neighboring area, and supports a rapid and accurate processing by a rapid dispatch of a firefighter, rather than a wide range of guidance such as an existing emergency disaster guidance letter when it is determined to be an actual fire through the confirmation procedure.