• Title/Summary/Keyword: WAVE messages

Search Result 26, Processing Time 0.028 seconds

A Comparison of EEG and Forearms EMG Activity depend on the Type of Smartphone when Inputting Text Messages (스마트폰 유형에 따른 문자 입력 시 뇌파 및 아래팔 근활성도 비교)

  • Lee, Hyoungsoo;Go, Gyeongjin;Kim, Jinwon;Park, Songyi;Park, Jiseon;Park, Jinri;Seok, Hyer;Yang, Gureum;Yang, Sieun;Yun, Gwangoh
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.2 no.2
    • /
    • pp.79-88
    • /
    • 2014
  • Purpose: This study investigated the relationship between smartphone addiction propensities and compare muscle activity of the forearms and brain wave depend on the type of smartphone when inputting text messages. Method: We used an EMG to measure the change in muscle activity by attaching pads to the four muscles in both forearms of all 16 participants. We simultaneously conducted EEG measurements by observing the changes in alpha and beta waves recorded from electrode attached to both ears and the forehead of the participants. The participants had to input a given text using three different types of smartphones for ten minutes each. Result: The comparison of the EMG when inputting text involved a one way analysis of variance and the results showed that the iPad3 was highest for muscle activity followed by GALAXY Note2 and iPhone4. For EEG measurement, a one way analysis of variance was also used and the results showed iPhone4 was higest followed by GALAXY Note2 and finally iPad3 for EEG stress score. Conclusion: The results are thought to be used as reference data for smart phone users.

A New Interference-Aware Dynamic Safety Interval Protocol for Vehicular Networks

  • Yoo, Hongseok;Chang, Chu Seock;Kim, Dongkyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.2
    • /
    • pp.1-13
    • /
    • 2014
  • In IEEE 802.11p/1609-based vehicular networks, vehicles are allowed to exchange safety and control messages only within time periods, called control channel (CCH) interval, which are scheduled periodically. Currently, the length of the CCH interval is set to the fixed value (i.e. 50ms). However, the fixed-length intervals cannot be effective for dynamically changing traffic load. Hence, some protocols have been recently proposed to support variable-length CCH intervals in order to improve channel utilization. In existing protocols, the CCH interval is subdivided into safety and non-safety intervals, and the length of each interval is dynamically adjusted to accommodate the estimated traffic load. However, they do not consider the presence of hidden nodes. Consequently, messages transmitted in each interval are likely to overlap with simultaneous transmissions (i.e. interference) from hidden nodes. Particularly, life-critical safety messages which are exchanged within the safety interval can be unreliably delivered due to such interference, which deteriorates QoS of safety applications such as cooperative collision warning. In this paper, we therefore propose a new interference-aware Dynamic Safety Interval (DSI) protocol. DSI calculates the number of vehicles sharing the channel with the consideration of hidden nodes. The safety interval is derived based on the measured number of vehicles. From simulation study using the ns-2, we verified that DSI outperforms the existing protocols in terms of various metrics such as broadcast delivery ration, collision probability and safety message delay.

Channel assignment for 802.11p-based multi-radio multi-channel networks considering beacon message dissemination using Nash bargaining solution (802.11p 기반 다중 라디오 다중채널 네트워크 환경에서 안전 메시지 전송을 위한 내쉬 협상 해법을 이용한 채널할당)

  • Kwon, Yong-Ho;Rhee, Byung-Ho
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.63-69
    • /
    • 2014
  • For the safety messages in IEEE 802.11p vehicles network environment(WAVE), strict periodic beacon broadcasting requires status advertisement to assist the driver for safety. WAVE standards apply multiple radios and multiple channels to provide open public road safety services and improve the comfort and efficiency of driving. Although WAVE standards have been proposed multi-channel multi-radio, the standards neither consider the WAVE multi-radio environment nor its effect on the beacon broadcasting. Most of beacon broadcasting is designed to be delivered on only one physical device and one control channel by the WAVE standard. also conflict-free channel assignment of the fewest channels to a given set of radio nodes without causing collision is NP-hard, even with the knowledge of the network topology and all nodes have the same transmission radio. Based on the latest standard IEEE 802.11p and IEEE 1609.4, this paper proposes an interference aware-based channel assignment algorithm with Nash bargaining solution that minimizes interference and increases throughput with wireless mesh network, which is deigned for multi-radio multi-cahnnel structure of WAVE. The proposed algorithm is validated against numerical simulation results and results show that our proposed algorithm is improvements on 8 channels with 3 radios compared to Tabu and random channel allocation algorithm.

Implementation of StegoWaveK using an Improved Lowbit Encoding Method (개선된 Lowbit Encoding 방법을 이용한 StegoWavek의 구현)

  • 김영실;김영미;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.470-485
    • /
    • 2003
  • The steganography is one of methods that users can hide data. Some steganography softwares use audio data among multimedia data. However, these commercialized audio steganography softwares have disadvantages that the existence of hidden messages can or easily recognized visually and only certain-sized data can be hidden. To solve these problems, this study suggested, designed and implemented Dynamic Message Embedding (DME) algorithm. Also, to improve the security level of the secret message, the file encryption algorithm has been applied. Through these, StegoWaveK system that performs audio steganography was designed and implemented. Then, the suggested system and the commercialized audio steganography system were compared and analyzed on criteria of the Human Visilable System (HVS), Human Auditory System (HAS), Statistical Analysis (SA), and Audio Measurement (AM).

Measurement of Radio Characteristics of Vehicular Communication Environments in Urban Areas and Implementation Issues (도심 차량통신환경에서의 전파특성 측정과 구현 이슈)

  • Cho, Woong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.9
    • /
    • pp.1057-1062
    • /
    • 2014
  • Vehicular communications can be applied for transmission of various safety messages or Intelligent Transportation Systems(ITS) applications by combining vehicle/road technology with Information and Communication Technology(ICT). In this paper, we represent measurement results of radio characteristics of vehicular communications using IEEE 802.11p based system in urban environments. Radio characteristics are based on the packet error rate (PER) and received spectrum mask. Using measurement results, we discuss implementation issues of vehicular communication systems for supporting reliable services.

Design and Implementation of IEEE Std 1609.2 Message Encoder/Decoder for Vehicular Communication Security (자동차 통신 보안을 위한 IEEE Std 1609.2 메시지 인코더/디코더의 설계 및 구현에 관한 연구)

  • Seo, Hye-In;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.568-577
    • /
    • 2017
  • IEEE Std 1609.2 was defined for the support of communication security functions in the WAVE (Wireless Access in Vehicular Environments) system. IEEE Std 1609.2 defined the message structures of the security services and managements on the vehicular communication by using ASN.1 (Abstract Syntax Notation One). Also, this security message structures shall be encoded using the COER (Canonical Octet Encoding Rules). In this paper, we designed and implemented the IEEE Std 1609.2 message encoder/decoder handling the security messages defined in IEEE Std 1609.2. The designed encoder/decoder consists of three modules as follows : a module generating the message of C language data structures in accord with IEEE Std 1609.2 message structures, a message encoder module, a message decoder module. And the encoder/decoder was implemented on the Linux environment. Also we analyzed the performance by measuring the performance speed of the encoder/decoder implemented.

Random Backoff Scheme of Emergency Warning Message for Vehicle-to-Vehicle Communications (차량 간 통신에서 충돌을 완화하기 위한 랜덤 백오프 방안)

  • Byun, Jae-Uk;Kwon, Sung-Oh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.165-173
    • /
    • 2012
  • In this paper, we propose a random backoff scheme for Emergency Warning Messages (EWMs) in the vehicle-to-vehicle environment. The EWMs are disseminated from a vehicle that detects an emergency situation to other vehicles in a multi-hop fashion. Since the vehicle-to-vehicle communication based on IEEE 802.11 adapts CSMA/CA, the density of vehicles increase the probability of collisions between transmissions. Moreover, in the presence of background traffic, the EWM should have a higher priority than that of other messages in neighboring vehicles. To that end, we propose the Distant-Dependent Adaptive Backoff (DDAB) scheme, which set a different contention window for random backoff depending on the distance from the sender to the receiver. In the case when a vehicle is expected to located in the outskirts of the communication boundary, the proposed scheme makes the contention window size small in order to compete the background traffic transmission. Otherwise the contention window is set to a large number to reduce the collision possibility among the EWM transmissions. Via simulations, we show that the proposed scheme performs better than the previous schemes for EWM.

Study on the time-delay compensation of RTK correction message for improvement of continuous position surveying performance under unexpected temporal datalink loss/cut-off (RTK 보정정보 난수신 환경에서의 측위연속성 향상을 위한 시간지연 보상연구)

  • Park, Byung-Woon;Song, June-Sol;Kee, Chang-Don;Yang, Chul-Soo;Tcha, Dek-Kie
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.5
    • /
    • pp.625-631
    • /
    • 2010
  • In this paper, robustness performance of SNUR message is compared with those of existing ones, RTCM(Radio Technical Commission for Maritime Services) v2 MT(Message Type) 18/19 and MT 20/21 under a poor broadcast condition such as temporary data loss or disconnection We defined the temp oral data loss as 2 second delay and reconnection after disconnection as 7 second latency, and then evaluated its robustness for each latency case by double differentiating the observables. Our result shows that SNUR protocol method can reduce the latency error of the existing RTCM messages by 30~60%. Moreover, a rover using SNUR message, whose latency error is bounded within 1/4 L1 wave length, can figure out its own fixed position continuously in spite of 7 second disconnection, while the other using RTCM message, whose error is larger than half wave length, cannot keep its previous fixed solution.

Contention-based Reservation Protocol Using a Counter for Detecting a Source Conflict in WDM Single-hop Optical Network with Non-equivalent Distance

  • Sakuta, Makoto;Nishino, Yoshiyuki;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.365-373
    • /
    • 2001
  • We propose a new channel reservation protocol which can reduce message delay by using a counter for detection of d source conflict in a WDM single-hop network with non-equivalent propagation delay. A source convict occurs when a source node has the right to transmit more than or equal to two messages simultaneously, which are transmitted using different wavelengths. In such a case, the source node has to newly obtain the right to transmit the message. In the proposed protocol, by using a source conflict counter a source node can detect a source conflict before a wave-length assignment is performed. Therefore, the source node can start a procedure to newly obtain the right to transmit the message which cannot be transmitted due to a source conflict. We analyse the throughput performance by taking the effect of a source conflict into account, and show that the approximate analysis and the computer simulated results are close. Also, from computer simulated results, we show that our proposed protocol can reduce mean message delay dramatically without degrading throughput performance as the offered load becomes large.

  • PDF

The Diffusion of Rumor Via Twitter : The Diffusion Trend and the User Interactivity in the Korea-U.S. FTA Case (트위터를 통한 루머의 확산 과정 연구: 한미 FTA 관련 루머의 자극성에 따른 의견 확산 추이와 이용자의 상호작용성을 중심으로)

  • Hong, Ju-Hyun;Yun, Hae-Jin
    • Korean journal of communication and information
    • /
    • v.66
    • /
    • pp.59-86
    • /
    • 2014
  • This study explored how rumor is diffused via Twitter and how the characteristics of rumor affect the interactivity among users in the Korea-U.S. FTA case. A key word search located three issues as major ones related to the Korea-U.S. FTA: appendectomy myth, collapse of health insurance, and increases in medicine prices. The arousal of rumor has two dimensions: fact and expression. The fact arousal was the highest in the issue of 'appendectomy myth', and the expression arousal the highest in 'increases in medicine prices'. The rumor diffusion took the 'explosive wave' in the issue of appendectomy myth, the 'latent wave' in the issue of increase in medicine prices, and the 'repetitive wave' in the issue of collapse of health insurance. Correlation analyses revealed a high correlation between the arousal intensity of rumor and the user interactivity in the issue of collapse of health insurance. The study showed that Twitter took a role of diffusing negative messages about the Korea-U.S. FTA. Results implies that government officials and journalists pay attention to Twitter for sensing the public opinion when building policies and managing crises.

  • PDF