• Title/Summary/Keyword: Sensor block

Search Result 295, Processing Time 0.024 seconds

Development of Vehicle Oriented Black Box System Based on U-Healthcare and Human-Free Guard Functions

  • Lee, Dong-Myung
    • Journal of Engineering Education Research
    • /
    • v.13 no.5
    • /
    • pp.36-40
    • /
    • 2010
  • The vehicle oriented block box system based on the u-healthcare and the human-free guard functions is developed in this paper. We also suggested the design philosophies, ideas, and analyzed the performance of the suggested system. The developed vehicle oriented black box system has some characteristics such as; 1) detects the dangerous situation by ultrasonic sensor in advance, and stores the situation information of the neighborhood of the vehicle to the imbedded SD memory card if the dangerous situation may be occurred in the parked vehicle; 2) detects the present location and speed information of the vehicle by GPS receiver and 3-axes acceleration sensor, and stores the information to the SD memory card periodically if the vehicle is running; 3) measures the dioxide carbon in the vehicle inside using $CO_2$ sensor, and forces the ventilation motor of the vehicle to operate and maintains the driver's health if the measured level is more than standard health requirements; 4) provides the stored vehicle's operating information to the driver by GUI (Graphical User Interface) based touch LCD monitor.

  • PDF

Applying a sensor energy supply communication scheme to big data opportunistic networks

  • CHEN, Zhigang;WU, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2029-2046
    • /
    • 2016
  • Energy consumption is an important index in mobile ad hoc networks. Data packet transmission increases among nodes, particularly in big data communication. However, nodes may be unable to transmit data packets because of energy over-consumption. Consequently, information may be lost and network communication may block. While opportunistic network is a kind of mobile ad hoc networks, researchers do not focus on energy consumption in opportunistic network communication. This study proposed an effective sensor energy supply scheme that can be applied in opportunistic networks. This scheme considers nodes sensor requests and communication model. In this scheme, nodes do not only accomplish energy supply in communication, but also extend communication time in opportunistic networks. Compared with the Spray and Wait algorithm and the Binary Spray and Wait algorithm in simulations, the proposed scheme extends communication time, increases data packet transmission, and accomplishes energy supply among nodes.

Electrical Impedance Change due to Contamination at the Contact Interface of Connectors for Automobile Crank Shaft Position Sensor

  • Kim, Young-Tae;Sung, In-Ha;Kim, Dae-Eun
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.5 no.2
    • /
    • pp.46-52
    • /
    • 2004
  • Numerous connectors are used in automobiles for transmission of electrical signals across various electro-mechanical components. The connectors must operate with high reliability in order to minimize failures due to signal degradation. In this work, the effects of contamination at the contact interface of connectors used fur automobile crankshaft position sensor on the impedance change were investigated. An experimental set-up was built to simulate the electrical signal transmitted from the sensor to the engine control unit through a connector. Output from the connector was investigated using connectors contaminated with engine block residues and water droplets. It was found that slight contamination of the connectors could lead to significant signal degradation which can lead to engine failure. Also, the effect of water in the connector altered the signal severely. However, the signal gradually regained the original state as the water evaporated from the interface.

Effect of Sensitivity Variation for Mounting Methods of Accelerometer in Crash Test (충돌시험시 가속도 센서의 접착방법이 감도 변화에 미치는 영향)

  • Jang, Won-Ho;Kim, Ki-Oh;Beom, Hyen-Kyun;Kwon, Sung-Eun
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.16 no.6
    • /
    • pp.115-120
    • /
    • 2008
  • There are many typesof accelerometer sensor. There was mainly used high-g accelerometer to obtain data for vehicle in crash test. Accelerometer was mounted on test vehicle with mounting blocks. Test result can be influenced by condition of mounting i.e. bonding material and type of block. These influences can be evaluated to variation of sensitivity in calibration test. In this paper, Calibration test were carried out for 3 types of bonding material i.e. stud, beewax and double side tape. Other factor was taken into consideration by 3-types for mounting block. All test was conducted by sinusoidal signal vibrator up to 4500Hz. In order to investigate influence for sensitivity from different input voltage in the calibrator, the same test was repeated. Test results were compared with standard accelerometer data. Relative sensitivities and phases were showed small difference in sensitivity for bonding materials with one block, but significant one for another block and different input voltage below 1000Hz.

Analysis of Block FEC Symbol Size's Effect On Transmission Efficiency and Energy Consumption over Wireless Sensor Networks (무선 센서 네트워크에서 전송 효율과 에너지 소비에 대한 블록 FEC 심볼 크기 영향 분석)

  • Ahn, Jong-Suk;Yoon, Jong-Hyuk;Lee, Young-Su
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.803-812
    • /
    • 2006
  • This paper analytically evaluates the FEC(Forward Error Correction) symbol size's effect on the performance and energy consumption of 802.11 protocol with the block FEC algorithm over WSN(Wireless Sensor Network). Since the basic recovery unit of block FEC algorithms is symbols not bits, the FEC symbol size affects the packet correction rate even with the same amount of FEC check bits over a given WSN channel. Precisely, when the same amount of FEC check bits are allocated, the small-size symbols are effective over channels with frequent short bursts of propagation errors while the large ones are good at remedying the long rare bursts. To estimate the effect of the FEC symbol site, the paper at first models the WSN channel with Gilbert model based on real packet traces collected over TIP50CM sensor nodes and measures the energy consumed for encoding and decoding the RS (Reed-Solomon) code with various symbol sizes. Based on the WSN channel model and each RS code's energy expenditure, it analytically calculates the transmission efficiency and power consumption of 802.11 equipped with RS code. The computational analysis combined with real experimental data shows that the RS symbol size makes a difference of up to 4.2% in the transmission efficiency and 35% in energy consumption even with the same amount of FEC check bits.

Security Analysis of Block Cipher MD-64 Suitable for Wireless Sensor Network Environments (무선 센서 네트워크 환경에 적합한 블록 암호 MD-64에 대한 안전성 분석)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.865-870
    • /
    • 2011
  • MD-64 is a 64-bit block cipher suitable for the efficient implementation in hardware environments such as WSN. In this paper, we propose a related-key amplified boomerang attack on the full-round MD-64. The attack on the full-round MD-64 requires $2^{45.5}$ related-key chosen plaintexts and $2^{95}$ MD-64 encryptions. This work is the first known cryptanalytic result on MD-64.

Differential Fault Analysis on Block Cipher Piccolo-80 (블록 암호 Piccolo-80에 대한 차분 오류 공격)

  • Jeong, Ki-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.3
    • /
    • pp.510-517
    • /
    • 2012
  • Piccolo-80 is a 64-bit ultra-light block cipher suitable for the constrained environments such as wireless sensor network environments. In this paper, we propose a differential fault analysis on Piccolo-80. Based on a random byte fault model, our attack can the secret key of Piccolo-80 by using the exhaustive search of $2^{24}$ and six random byte fault injections on average. It can be simulated on a general PC within a few seconds. This result is the first known side-channel attack result on Piccolo-80.

3D shape reconstruction using laser slit beam and image block (레이저슬릿광과 이미지블럭을 이용한 경면물체 형상측정알고리즘)

  • 곽동식;조형석;권동수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.93-96
    • /
    • 1996
  • Structured laser light is a widely used method for obtaining 3D range information in Machine Vision. However, The structured laser light method is based on assumption that the surface of objects is Lambertian. When the observed surfaces are highly specularly reflective, the laser light can be detected in various parts on the image due to a specular reflection and secondary reflection. This makes wrong range data and the image sensor unusable for the specular objects. To discriminate wrong range data from obtained image data, we have proposed a new algorithm by using the cross section of image block. To show the performance of the proposed method, a series of experiments was, carried out on: the simple geometric shaped objects. The proposed method shows a dramatic improvement of 3D range data better than the typical structured laser light method.

  • PDF

Security Analysis of Block Cipher Piccolo-128 Applicable to Various Environments (다양한 환경에 적용 가능한 블록 암호 Piccolo-128에 대한 안전성 분석)

  • Jeong, Ki-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.5
    • /
    • pp.787-793
    • /
    • 2012
  • Piccolo-128 is a 64-bit ultra-light block cipher suitable for the constrained environments such as wireless sensor network environments. In this paper, we propose biclique cryptanalysis on the full Piccolo-128. To recover the secret key of Piccolo-128, the proposed attack requires $2^{24}$ chosen plaintexts and the computational complexity of about $2^{127.35}$. This result is the first known theoretical attack result on the full Piccolo-128.

Security Analysis of Block Cipher LED-64 Suitable for Wireless Sensor Network Environments (무선 센서 네트워크 환경에 적합한 블록 암호 LED-64에 대한 안전성 분석)

  • Jeong, Ki-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.70-75
    • /
    • 2012
  • LED-64 is a 64-bit block cipher proposed in CHES 2011 and suitable for the efficient implementation in constrained hardware environments such as WSN. In this paper, we propose a differential fault analysis on LED-64. In order to recover the secret key of LED-64, this attack requires only one random nibble fault and an exhaustive search of $2^8$. This work is the first known cryptanalytic result on LED-64.