• Title/Summary/Keyword: Sensing technologies

Search Result 468, Processing Time 0.033 seconds

Implementation of Spectrum Sensing Module based on IEEE 802.22 WRAN (IEEE 802.22 WRAN 기반 스펙트럼 센싱 모듈 구현)

  • Lee, Hyun-So;Kim, Kyung-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.3
    • /
    • pp.39-48
    • /
    • 2009
  • The Spectrum Sensing technology is the core technology of the Cognitive Radio (CR) system that is one of the future wireless communication technologies. This is the technology that temporarily allocates the frequency bandwidth by scanning surrounding wireless environments to keep licensed terminals and search the unused frequency bandwidth. In this paper, we implement the efficient Spectrum Sensing methods based on CR technology in an embedded board. The DVB-H signal with the 6MHz bandwidth is used as the RF input signal. And we confirm the Spectrum Sensing result using Modified Periodogram Method, Welch's Method, SCF Method. And also, We examine the execution speed of each of detailed functions and the performance of Spectrum Sensing methods on TI320C6416 DSP board inserted in an embedded board.

VEHICLE CRASH ANALYSIS FOR AIRBAG DEPLOYMENT DECISION

  • Hussain, A.;Hannan, M.A.;Mohamed, A.;Sanusi, H.;Ariffin, A.K.
    • International Journal of Automotive Technology
    • /
    • v.7 no.2
    • /
    • pp.179-185
    • /
    • 2006
  • Airbag deployment has been responsible for huge death, incidental injuries and broken bones due to low crash severity and wrong deployment decision. This misfortune has led the authorities and the industries to pursue uniquely designed airbags incorporating crash-sensing technologies. This paper provides a thorough discussion underlying crash sensing algorithm approaches for the subject matter. Unfortunately, most algorithms used for crash sensing still have some problems. They either deploy at low severity or fail to trigger the airbag on time. In this work, the crash-sensing algorithm is studied by analyzing the data obtained from the variables such as (i) change of velocity, (ii) speed of the vehicle and (iii) acceleration. The change of velocity is used to detect crash while speed of the vehicle provides relevant information for deployment decision. This paper also demonstrates crash severity with respect to the changing speed of the vehicle. Crash sensing simulations were carried out using Simulink, Stateflow, SimMechanics and Virtual Reality toolboxes. These toolboxes are also used to validate the results obtained from the simulated experiments of crash sensing, airbag deployment decision and its crash severity detection of the proposed system.

A Generalized Markovian Based Framework for Dynamic Spectrum Access in Cognitive Radios

  • Muthumeenakshi, K.;Radha, S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1532-1553
    • /
    • 2014
  • Radio spectrum is a precious resource and characterized by fixed allocation policy. However, a large portion of the allocated radio spectrum is underutilized. Conversely, the rapid development of ubiquitous wireless technologies increases the demand for radio spectrum. Cognitive Radio (CR) methodologies have been introduced as a promising approach in detecting the white spaces, allowing the unlicensed users to use the licensed spectrum thus realizing Dynamic Spectrum Access (DSA) in an effective manner. This paper proposes a generalized framework for DSA between the licensed (primary) and unlicensed (secondary) users based on Continuous Time Markov Chain (CTMC) model. We present a spectrum access scheme in the presence of sensing errors based on CTMC which aims to attain optimum spectrum access probabilities for the secondary users. The primary user occupancy is identified by spectrum sensing algorithms and the sensing errors are captured in the form of false alarm and mis-detection. Simulation results show the effectiveness of the proposed spectrum access scheme in terms of the throughput attained by the secondary users, throughput optimization using optimum access probabilities, probability of interference with increasing number of secondary users. The efficacy of the algorithm is analyzed for both imperfect spectrum sensing and perfect spectrum sensing.

Implementation of Spectrum Sensing Module using STFT Method (STFT 기법을 적용한 스펙트럼 센싱 모듈 구현)

  • Lee, Hyun-So;Kang, Min-Kyu;Moon, Ki-Tak;Kim, Kyung-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.78-86
    • /
    • 2010
  • The Spectrum Sensing Technology is the core technology of the Cognitive Radio (CR) System that is one of the future wireless communication technologies. In this paper, we proposed the efficient Spectrum Sensing Method using the Short Time Fourier Transform (STFT) that is the algorithm for Time-Frequency analysis of the raw data. Applied window function to STFT algorithm is a Kaiser window, it is piled up its 50% range. For the simulation, the DVB-H signal with the 6MHz bandwidth is used as the Input Signal. And we confirm the Spectrum Sensing result using Modified Periodogram Method, Welch's Method for compared with Short Time Fourier Transform Algorithm. And also, Spectrum Sensing Module is implemented using embedded board.

Gas Distribution Mapping and Source Localization: A Mini-Review

  • Taehwan Kim;Inkyu Park
    • Journal of Sensor Science and Technology
    • /
    • v.32 no.2
    • /
    • pp.75-81
    • /
    • 2023
  • The significance of gas sensors has been emphasized in various industries and applications, owing to the growing significance of environmental, social, and governance (ESG) management in corporate operations. In particular, the monitoring of hazardous gas leakages and detection of fugitive emissions have recently garnered significant attention across several industrial sectors. As industrial workplaces evolve to ensure the safety of their working environments and reduce greenhouse gas emissions, the demand for high-performance gas sensors in industrial sectors dealing with toxic substances is on the rise. However, conventional gas-sensing systems have limitations in monitoring fugitive gas leakages at both critical and subcritical concentrations in complex environments. To overcome these difficulties, recent studies in the field of gas sensors have employed techniques such as mobile robotic olfaction, remote optical sensing, chemical grid sensing, and remote acoustic sensing. This review highlights the significant progress made in various technologies that have enabled accurate and real-time mapping of gas distribution and localization of hazardous gas sources. These recent advancements in gas-sensing technology have shed light on the future role of gas-detection systems in industrial safety.

Simulating Pedestrian Evacuation Using Geographic Information Technologies

  • Jingjing, Shi;Hui, Lin
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.414-416
    • /
    • 2003
  • Pedestrian assemblage is now a normal phenomenon in modern cities. To maintain an unblocked traffic situation, protect the pedestrians' safety and make preparedness for any emergencies is an important task for police department. Modeling pedestrian dynamics and simulating evacuation process can provide useful information for make accurate decisions. In this paper, by virtue of geographic information technologies, the authors proposed a conceptual framework to simulate pedestrian dynamics and evacuation in an open urban environment.

  • PDF

Time Series Analysis of SPOT VEGETATION Instrument Data for Identifying Agricultural Pattern of Irrigated and Non-irrigated Rice cultivation in Suphanburi Province, Thailand

  • Kamthonkiat, Daroonwan;Kiyoshi, Honda;Hugh, Turral;Tripathi, Nitin K.;Wuwongse, Vilas
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.952-954
    • /
    • 2003
  • In this paper, we present the different characteristics of NDVI fluctuation pattern between irrigated and non-irrigated area in Suphanburi province, in Central Thailand. For non-irrigated rice cultivation area, there is a strong correlation between NDVI fluctuation and peak rainfall, while there is a lower correlation with irrigated area. In this study, the 'peak detector' classifier was developed to identify the area of non-irrigated and irrigated cropping and its cropping intensity (number of crops per year). This classifier was created based on cropping characteristics such as number of crops, time or planting period of each crop and its relationship with the peak of rainfall. The classified result showed good accuracy in identification irrigated and nonirrigated rice cultivation areas.

  • PDF

A Study on the Use of Ubiquitous Technologies in Military Sector

  • Ju Min-Seong;Kim Seok-Soo
    • International Journal of Contents
    • /
    • v.2 no.2
    • /
    • pp.6-9
    • /
    • 2006
  • The style of war in the $21^{st}$ century became digitalized cooperative union tactic, which relies heavily on the system providing real time information. Critical information is provided during the war from sensing to shooting. Therefore, epochal development in observation, reconnaissance (ISR), commanding (C4I) and precision strike (PGM) are necessary. Application of ubiquitous computing and network technologies in national defense is necessary for carrying out with various types of wars in the $21^{st}$ century. Therefore, the author wants to research core technology sector that can be developed and applied in preparation of ubiquitous national defense era. Also plans for applying recent u-Defense technology to the military sector had been suggested. Particularly, the author have suggested plans for utilizing combined future information technologies such as ad-hoc network, RFID for the logistic supply in construction of u-Defense system. By utilizing these information technologies, combat power and strategic capabilities of the military can be enhanced greatly.

  • PDF

Analysis of Essential Function of Composite Sensor for the Ground Work of a Large Construction Project (대형 건설프로젝트 현장관리를 위한 복합센서의 필수기능 분석)

  • Cho, Nam-Seok;Kim, Chang-Won;Cho, Dae-Gu;Cho, Hun-Hee;Kang, Kyung-In
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2012.05a
    • /
    • pp.39-40
    • /
    • 2012
  • Construction IT convergency proposes advanced management abilities of a construction project. Sensing data provided by various sensor technologies can be utilized for diverse management areas. This study analyzes required functions of sensors for implementing time, cost, safety and quality management, focusing on the ground works including excavation, pipe installation, retaining wall etc. Therefore, this study first generates essential management areas, analyzes cutting-edge sensor technologies appropriated for the areas, and finally proposes a matrix system that represents relationships between the management areas and sensor technologies, The proposed system is expected to reinforce construction management abilities by integrating sensor technologies.

  • PDF

Trends in Automotive Ethernet Security Technology (오토모티브 이더넷 보안 기술)

  • Chung, B.H.;Kim, D.W.;Jeon, B.S.;Ju, H.I.;Na, J.C.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.5
    • /
    • pp.76-85
    • /
    • 2018
  • In recent years, automobiles have evolved from simple transportation to convergence devices, and have combined the Internet of things, high-speed communications, and artificial intelligence technologies to provide people with social and cultural benefits. To provide services such as a smart traffic analysis, autonomous driving, and unmanned driving, automobiles applying these technologies are required to perform various types of sensing and image analyses for vehicle recognition and distance measurements. addition, there has been a rapid increase in the need to introduce an automotive Ethernet, that can provide a wide bandwidth to support. such technologies. In this article, we survey the latest trends in automotive Ethernet based automobiles and their security threats, and analyze the status and prospects of security technologies applied to cope with them.