• Title/Summary/Keyword: Wireless

Search Result 16,275, Processing Time 0.038 seconds

The Realization on GAS Sensor Module for Inteligent Wireless Communication (지능형 무선통신용 가스 센서 모듈 구현)

  • Kim, Hyo-Chan;Weon, Young-Su;Cho, Hyung-Rae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.6
    • /
    • pp.123-132
    • /
    • 2012
  • Gas sensors has been used very differently that depending on following purposes; Automotive (exhaust gas, fuel mixture gas, oxygen, particulates), agriculture / food industry (fresh, stored, CO2, humidity, NH3, nitrogen oxide gas, organic gas, toxic gas emitted from pesticides and insecticides), industrial / medical (chemical gas, hydrogen, oxygen and toxic gases), military (chemical weapon), environmental measurements (CO and other air pollution consisting of sulfur and nitrogen gas), residential (LNG, LPG, butane, indoor air, humidity). The types of industrial toxic substances are known about 700 species and many of these exist in gaseous form under normal conditions. he multi-gas detection sensors will be developed for casualties that detect the most important and find easy three kinds of gases in marine plant; carbon dioxide(CO2), carbon(CO), ammonia(NH3). Package block consists of gas sensing device minor ingredient, rf front end, zigbee chip. Develope interworking technology between the sensor and zigbee chip inside a package. Conduct a performance test through test jig about prototype zigbee sensor module with rf output power and unwanted emission test. This research task available early address when poisonous gas leaked from large industrial site and contribution for workers' safety at the enclosed space.

A Resilient Key Renewal Scheme in Wireless Sensor Networks (센서 네트워크에서 복원력을 지닌 키갱신 방안)

  • Wang, Gi-Cheol;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.103-112
    • /
    • 2010
  • In sensor networks, because sensors are deployed in an unprotected environment, they are prone to be targets of compromise attack, If the number of compromised nodes increases considerably, the key management in the network is paralyzed. In particular, compromise of Cluster Heads (CHs) in clustered sensor networks is much more threatening than that of normalsensors. Recently, rekeying schemes which update the exposed keys using the keys unknown to the compromised nodes are emerging. However, they cause some security and efficiency problems such as single group key employment in a cluster, passive eviction of compromised nodes, and excessive communication and computation overhead. In this paper, we present a proactive rekeying scheme using renewals of duster organization for clustered sensor networks. In the proposed scheme, each sensor establishes individual keys with neighbors at network boot-up time, and these keys are employed for later transmissions between sensors and their CH. By the periodic cluster reorganization, the compromised nodes are expelled from network and the individual keys employed in a cluster are changed continuously. Besides, newly elected CHs securely agree a key with sink by informing their members to sink, without exchangingany keying materials. The simulation results shows that the proposed scheme remarkably improves the confidentiality and integrity of data in spite of the increase of compromised nodes. Also, they show that the proposed scheme exploits the precious energy resource more efficiently than SHELL.

Effects of Tube Voltage and Tube Current on Exposure Index : Focused on Radiographic Images of Cone Pyramid Phantom (관전압과 관전류량이 노출 지수에 미치는 영향 : 원뿔형 피라미드 팬텀 방사선영상 중심으로)

  • Seoung, You-Hun
    • Journal of the Korean Society of Radiology
    • /
    • v.13 no.5
    • /
    • pp.749-755
    • /
    • 2019
  • In this study, we investigated the effects of tube voltage (kVp) and tube current (mAs) on an exposure index (EI) applied to a digital radiography. There used an inverter type digital X-ray generator and an image receptor (IR) utilized a portable wireless detector without a grid. Radiographic images were acquired using a cone pyramid phantom produced using a 3D printer. The X-ray tube voltage was increased from 40 kVp to 120 kVp with 10 kVp increment, and the tube current was increased from 1 mAs to 128 mAs with the twice increment. As a result, kVp had logarithmic relationship with the EI as high $R^2$ value, and mAs had a very high linear relationship too. Also, there was a high correlation between the area dose and the EI of the IR, with the $R^2$ value being 0.76 or more. In conclusion, it had showed that mAs affected the EI linearly, and that it could be advantageous to adjust the easy-to-predict mAs to maintain proper image qualities.

Studies of the possibility of external threats of the automotive ECU through simulation test environment (자동차용 ECU의 CAN 메시지를 통한 자동차 공격 방법 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee;Park, Seung-Kyu;Kwon, Do-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.39-49
    • /
    • 2013
  • In this paper, security mechanism of internal network(CAN) of vehicle is a very incomplete state and the possibility of external threats as a way to build a test environment that you can easily buy from the market by the vehicle's ECU(Electric Control Unit) to verify and obtain a CAN message. Then, by applying it to ECU of the real car to try to attack is proposed. A recent study, Anyone can see plain-text status of the CAN message in the vehicle. so that in order to verify the information is vulnerable to attack from outside, analyze the data in a vehicle has had a successful attack, but attack to reverse engineering in the stationary state and buying a car should attempt has disadvantages that spatial, financial, and time costs occurs. Found through the car's ECU CAN message is applied to a real car for Potential threats outside of the car to perform an experiment to verify and equipped with a wireless network environment, the experimental results, proposed method through in the car to make sure the attack is possible. As a result, reduce the costs incurred in previous studies and in the information absence state of the car, potential of vehicle's ECU attack looks.

Multi-Hop Vehicular Cloud Construction and Resource Allocation in VANETs (VANET 망에서 다중 홉 클라우드 형성 및 리소스 할당)

  • Choi, Hyunseok;Nam, Youngju;Lee, Euisin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.11
    • /
    • pp.263-270
    • /
    • 2019
  • Vehicular cloud computing is a new emerging technology that can provide drivers with cloud services to enable various vehicular applications. A vehicular cloud is defined as a set of vehicles that share their own resources. Vehicles should collaborate with each other to construct vehicular clouds through vehicle-to-vehicle communications. Since collaborating vehicles to construct the vehicular cloud have different speeds, directions and locations respectively, the vehicular cloud is constructed in multi-hop communication range. Due to intermittent wireless connectivity and low density of vehicles with the limited resources, the construction of vehicular cloud with multi-hop communications has become challenging in vehicular environments in terms of the service success ratio, the service delay, and the transmitted packet number. Thus, we propose a multi-hop vehicular cloud construction protocol that increases the service success ratio and decreases the service delay and the transmitted packet number. The proposed protocol uses a connection time-based intermediate vehicle selection scheme to reduce the cloud failure probability of multi-hop vehicular cloud. Simulation results conducted in various environments verify that the proposed protocol achieves better performance than the existing protocol.

Comparative Analysis of Seismic Records Observed at Seismic Stations and Smartphone MEMS Sensors (지진관측소와 스마트폰 MEMS 센서 기록의 비교분석)

  • Jang, Dongil;Ahn, Jae-Kwang;Kwon, Youngwoo;Kwak, Dongyoup
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.41 no.5
    • /
    • pp.513-522
    • /
    • 2021
  • A smartphone (SMP) includes a MEMS sensor that can record 3-components motions and has a wireless network device to transmit data in live. These features and relatively low maintenance costs are the advantage of using SMPs as an auxiliary seismic observation network. Currently, 279 SMPs are monitoring seismic motions. In this study, we compare the SMP records with the seismic station (SS) records to validate SMP records. The data used for comparison are records for five earthquakes that occurred in 2019, which are 321 SS data recorded by the Korea Meteorological Administration and the Korea Institute of Geoscience and Mineral Resources and 145 recorded by SMPs. The analysis shows that the event-term corrected average residual of the SMP MEMS sensor records is 0.59 which indicating that the peak horizontal acceleration by SMP is 1.8 factor bigger than the peak ground acceleration by SS. In addition, the residuals tend to decrease as the installation floor of the smartphone MEMS sensor increases, which is the similar trend with response spectra from SS.

A Study on Energy Efficiency Improvement through Building Insulation Diagnosis (건축물 단열 진단을 통한 에너지 효율 개선에 관한 연구)

  • Cho, Kwangmoon
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.9-14
    • /
    • 2021
  • This paper discovers the energy loss factors through the insulation diagnosis of houses or buildings, and proposes directions for energy efficiency improvement. The energy efficiency factor of a building consists of insulation diagnosis, thermal bridge diagnosis, window diagnosis, airtight diagnosis, and equipment diagnosis. Among the residents and facilities in the energy welfare blind spot, an energy efficiency diagnosis was conducted for one senior citizen building located in Naju-si, Jeollanam-do, and energy efficiency diagnosis was conducted after insulation was installed. Energy measurement, diagnosis and analysis were performed using the IoT-based integrated wired/wireless energy diagnosis platform, Energy Finder. As a result of comparison, an overall energy saving rate of 16.38% was achieved. Annual heating energy consumption per unit area decreased from 333.51kWh before construction to 277.35kWh after construction, and annual cooling energy consumption per unit area decreased from 5.51kWh before construction to 5.22kWh after construction. The annual primary energy consumption per unit area decreased from 464.52kWh before construction to 403.69kWh after construction, and the annual energy cost was reduced from 3,063,307.14 won before construction to 2,641,072.49 won after construction. The additional improvement work is needed on the standards affecting energy efficiency other than insulation.

Development of the Dredged Sediments Management System and Its Managing Criteria of Debris Barrier (사방댐 준설퇴적물 관리시스템 개발 및 관리기준 제안)

  • Song, Young-Suk;Yun, Jung-Mann;Jung, In-Keun
    • Journal of the Korean Geosynthetics Society
    • /
    • v.17 no.4
    • /
    • pp.267-275
    • /
    • 2018
  • The dredged sediment management system was developed to have an objective, quantitative and scientific decision for the optimum removal time of dredged sediments behind debris barrier and was set up at the real site. The dredged sediment management system is designed and developed to directly measure the dredged sediments behind debris barrier in the field. This management system is composed of Data Acquisition System (DAS), Solar System and measurement units for measuring the weight of dredge sediments. The weight of dredged sediments, the water level and the rainfall are measured in real time using the monitoring sensors, and their data can be transmitted to the office through a wireless communication method. The monitoring sensors are composed of the rain gauge to measure rainfall, the load cell system to measure the weight of dredged sediments, and water level meter to measure the water level behind debris barrier. The management criteria of dredged sediments behind debris barrier was suggested by using the weight of dredged sediments. At first, the maximum weight of dredged sediments that could be deposited behind debris barrier was estimated. And then when 50%, 70% and 90% of the maximum dredged sediments weight were accumulated behind debris barrier, the management criteria were divided into phases of Outlooks, Watch and Warning, respectively. The weight of dredged sediments can be monitored by using the dredged sediment management system behind debris barrier in real time, and the condition of debris barrier and the removal time of dredged sediments can be decided based on monitoring results.

A Study on the Relationship between Level of Digital Informatization and Satisfaction Level of Elderly People: Focusing on community, meeting, and community involvement activities (장노년층의 디지털정보화 수준과 사회활동 만족도 수준과의 관계에 대한 연구: 커뮤니티, 모임, 공동체에의 참여활동을 중심으로)

  • Lee, Hyangsoo;Lee, Seong-Hoon
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.1-7
    • /
    • 2019
  • Our society is evolving into an aging society. The purpose of this study is to investigate how digital informatization capacity of elderly people, one of the so - called information - neglected people, affects social activities. To this end, we analyzed the relationship between digital informatization level and social activity satisfaction level of old elderly people based on the results of the digital information gap survey in 2017. As a result, it was found that there was a positive relationship between digital access and satisfaction level of social activities, such as whether elderly people have wired / wireless information devices and internet accessibility. Second, it was found that digital information capacity level such as PC usage ability and mobile digital device utilization ability had a positive (+) relationship with only social activities. Third, the level of satisfaction with social activities increased as the level of digital information utilization increased, such as whether they were using wired and mobile Internet. This suggests that the government needs a policy to resolve various information gaps that can enhance the level of digital informatization of elderly people.

An Origin-Centric Communication Scheme to Support Sink Mobility for Continuous Object Detection in IWSNs (산업용 무선 센서망을 이용한 연속개체 탐지에서 이동 싱크 지원을 위한 발원점 중심의 통신방안)

  • Kim, Myung-Eun;Kim, Cheonyong;Yim, Yongbin;Kim, Sang-Ha;Son, Young-Sung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.12
    • /
    • pp.301-312
    • /
    • 2018
  • In industrial wireless sensor networks, the continuous object detection such as fire or toxic gas detection is one of major applications. A continuous object occurs at a specific point and then diffuses over a wide area. Therefore, many studies have focused on accurately detecting a continuous object and delivering data to a static sink with an energy-efficient way. Recently, some applications such as fire suppression require mobile sinks to provide real-time response. However, the sink mobility support in continuous object detection brings challenging issues. The existing approaches supporting sink mobility are designed for individual object detection, so they establish one-to-one communication between a source and a mobile sink for location update. But these approaches are not appropriate for a continuous object detection since a mobile sink should establish one-to-many communication with all sources. The one-to-many communication increases energy consumption and thus shortens the network lifetime. In this paper, we propose the origin-centric communication scheme to support sink mobility in a continuous object detection. Simulation results verify that the proposed scheme surpasses all the other work in terms of energy consumption.