• Title/Summary/Keyword: Virtual Beacon

Search Result 19, Processing Time 0.02 seconds

A Study on Aids to Navigation Service Communications Network based on AIS (AIS 기반의 항로표지 서비스 통신망에 대한 연구)

  • Park, In-Hwan;Hwang, Seung-Wook;Lee, Seo-Jeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2010.04a
    • /
    • pp.143-144
    • /
    • 2010
  • Recently, IALA has introduced AIS AtoN and standardized Aids to Navigation communication system and the World-wide IALA-Net has announced plans to build the system. Systematic beacon network may offer opportunities to make infrastructure for information service and upgrade AtoN service performance. This paper proposes Aids to Navigation information service network for e-NAV. Network based on AIS is consist of AIS AtoN channels as Real, Synthetic or Virtual AIS AtoN. And inner network is consist of Wireless networks as AIS, WCDMA, WIFI, WlBRO, USN or VSAT. Introducing of various network systems can lead to combine and design among land, beacon and service network infrastructures.

  • PDF

Numerical Analysis of Relative Orbit Control Strategy for CANYVAL-X Mission

  • Lee, Youngro;Park, Sang-Young;Park, Jae-Pil;Song, Youngbum
    • Journal of Astronomy and Space Sciences
    • /
    • v.36 no.4
    • /
    • pp.235-248
    • /
    • 2019
  • This paper suggests a relative orbit control strategy for the CubeSat Astronomy by NASA and Yonsei using Virtual Telescope Alignment eXperiment (CANYVAL-X) mission whose main goal is to demonstrate an essential technique, which is an arrangement among two satellites and a specific celestial object, referred to as inertial alignment, for a next-generation virtual space telescope. The inertial alignment system is a relative orbit control system and has requirements for the relative state. Through the proposed orbit control strategy, consisting of separation, proximity keeping, and reconfiguration, the requirements will be satisfied. The separation direction of the two CubeSats with respect to the orbital plane is decided to provide advantageous initial condition to the orbit controller. Proximity keeping is accomplished by differential atmospheric drag control (DADC), which generates acceleration by changing the spacecraft's effective cross section via attitude control rather than consuming propellant. Reconfiguration is performed to meet the requirements after proximity keeping. Numerical simulations show that the requirements can be satisfied by the relative orbit control strategy. Furthermore, through numerical simulations, it is demonstrated that the inertial alignment can be achieved. A beacon signal had been received for several months after the launch; however, we have lost the signal at present.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

Cluster Based Multi-tier MAC Protocol for Dense Wireless Sensor Network (밀집된 무선센서네트워크를 위한 클러스터 기반의 멀티티어 MAC 프로토콜)

  • Hwan, Moon-Ji;Mu, Chang-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.101-111
    • /
    • 2011
  • A new MAC protocol, MT-MAC(Multi-Tier Medium Access Control) by name, is proposed for dense sensor networks. Depending on the density of nodes in a virtual cluster, the cluster header performs the splitting to several tiers in nodes of virtual cluster. MT-MAC split the tiers to use modfied-SYNC message after receiving the beacon message from the cluster header. Because only the sensor nodes in the same tier communicate each other, less power is consumed and longer network life time is guaranteed. By a simulation method with NS-2, we evaluated our protocol. In dense nodes environments, MT-MAC protocol shows better results than S-MAC in terms of packet delivery rates throughput and energy consumption.

A Real-Time Localization Platform Design in WUSB Services based on IEEE 802.15.6 WBAN Protocol for Wearable Computer Systems (IEEE 802.15.6 표준 기반 무선 USB 서비스를 위한 실시간 위치인식 플랫폼 설계)

  • Hur, Kyeong;Sohn, Won-Sung
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.885-890
    • /
    • 2012
  • In this Paper, we propose a Real-Time Localization Platform Built on WUSB (Wireless USB) over WBAN (Wireless Body Area Networks) protocol required for Wearable Computer systems. Proposed Real-Time Localization Platform Technique is executed on the basis of WUSB over WBAN protocol at each sensor node comprising peripherals of a wearable computer system. In the Platform, a WUSB host calculates the location of a receiving sensor node by using the difference between the times at which the sensor node received different WBAN beacon frames sent from the WUSB host. And the WUSB host interprets motion of the virtual object.

BLE-based Indoor Positioning System design using Neural Network (신경망을 이용한 BLE 기반 실내 측위 시스템 설계)

  • Shin, Kwang-Seong;Lee, Heekwon;Youm, Sungkwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.75-80
    • /
    • 2021
  • Positioning technology is performing important functions in augmented reality, smart factory, and autonomous driving. Among the positioning techniques, the positioning method using beacons has been considered a challenging task due to the deviation of the RSSI value. In this study, the position of a moving object is predicted by training a neural network that takes the RSSI value of the receiver as an input and the distance as the target value. To do this, the measured distance versus RSSI was collected. A neural network was introduced to create synthetic data from the collected actual data. Based on this neural network, the RSSI value versus distance was predicted. The real value of RSSI was obtained as a neural network for generating synthetic data, and based on this value, the coordinates of the object were estimated by learning a neural network that tracks the location of a terminal in a virtual environment.

An Analysis of ICT-Retail Convergence(IRC) and Consumer Value Creation (소비자 구매단계별 기술-유통 통합(IRC)과 가치에 대한 연구)

  • Park, Sunny;Cho, Eunsun;Rha, Jong-Youn;Lee, Yuri;Kim, Suyoun
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.147-157
    • /
    • 2017
  • Recently, ICT Retail Convergence(IRC) has been rapidly increasing to improve consumer satisfaction and consumer experience. In this paper, we aim to diagnose IRC from consumers' point of view by reviewing the present status and value of IRC according to consumer purchase decision making process. Based on the previous studies in retail industry, we classified IRC into 4 types: Experience-specific tech(Virtual Reality and Augmented Reality); Information-specific tech(Artificial Intelligence and Big Data); Location-based tech(Radio Frequency Identification and Beacon); Payment-related tech(Fin-tech and Biometrics). Next, we found that there is a difference in value provided to consumers according to the type of technology, analysing the value by consumer purchase decision making process. This study can be useful to introduce IRC for improving consumer satisfaction as well as ICT and Retail. Also, it can be basic data for future technology studies with a consumer perspective.

Offline Friend Recommendation using Mobile Context and Online Friend Network Information based on Tensor Factorization (모바일 상황정보와 온라인 친구네트워크정보 기반 텐서 분해를 통한 오프라인 친구 추천 기법)

  • Kim, Kyungmin;Kim, Taehun;Hyun, Soon. J
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.375-380
    • /
    • 2016
  • The proliferation of online social networking services (OSNSs) and smartphones has enabled people to easily make friends with a large number of users in the online communities, and interact with each other. This leads to an increase in the usage rate of OSNSs. However, individuals who have immersed into their digital lives, prioritizing the virtual world against the real one, become more and more isolated in the physical world. Thus, their socialization processes that are undertaken only through lots of face-to-face interactions and trial-and-errors are apt to be neglected via 'Add Friend' kind of functions in OSNSs. In this paper, we present a friend recommendation system based on the on/off-line contextual information for the OSNS users to have more serendipitous offline interactions. In order to accomplish this, we modeled both offline information (i.e., place visit history) collected from a user's smartphone on a 3D tensor, and online social data (i.e., friend relationships) from Facebook on a matrix. We then recommended like-minded people and encouraged their offline interactions. We evaluated the users' satisfaction based on a real-world dataset collected from 43 users (12 on-campus users and 31 users randomly selected from Facebook friends of on-campus users).

Design of Geo-fence-based Smart Attendance System (지오펜스 기반 스마트 출결시스템 설계)

  • Hong, Seong-Pyo;Kim, Tae-Yeun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.496-502
    • /
    • 2020
  • The electronic attendance management system is being introduced and operated on a pilot basis by some universities and educational institutions. However, most of the related systems have installed and operated the existing barcode and magnetic card systems. Classroom attendance is managed by introducing RF cards, but it causes problems such as recognition distance (less than 5cm) and the need for a check process in which students have to read the card each time with a reader for attendance. Also, it is not possible to respond in real time to the situation of midterm (early leave, absence from the second lecture time, etc.) because it is used in the lecture time of one subject with the record checked once. In order to solve these problems, the various mobile attendance systems proposed to solve these problems are also unable to fundamentally solve problems such as interim attendance and proxy attendance because they check attendance using only the application of a smartphone. In this paper, we use geofencing technology, which is a positioning-based technology that detects the entry and exit of people, objects, etc. in areas separated by virtual boundaries. The proposed system solves the problem of intermediate attendance and alternate attendance by setting the student to automatically record the access record when entering and leaving the classroom set as a geofence with a smartphone. In addition, it also provides a function to prevent unintentional mistakes that occur through the smartphone by limiting some of the functions of the smartphone such as silence, vibration, and Internet use when entering the classroom.