• Title/Summary/Keyword: Wireless

Search Result 16,241, Processing Time 0.049 seconds

IPv6 Migration, OSPFv3 Routing based on IPv6, and IPv4/IPv6 Dual-Stack Networks and IPv6 Network: Modeling, and Simulation (IPv6 이관, IPv6 기반의 OSPFv3 라우팅, IPv4/IPv6 듀얼 스택 네트워크와 IPv6 네트워크: 모델링, 시뮬레이션)

  • Kim, Jeong-Su
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.343-360
    • /
    • 2011
  • The objective of this paper is to analyze and characterize to simulate routing observations on end-to-end routing circuits and a ping experiment of a virtual network after modeling, such as IPv6 migration, an OSPFv3 routing experiment based on an IPv6 environment, and a ping experiment for IPv4/IPv6 dual-stack networks and IPv6 network for OSPFv3 routing using IPv6 planning and operations in an OPNET Modeler. IPv6 deployment based largely on the integrated wired and wireless network was one of the research tasks at hand. The previous studies' researchers recommended that future research work be done on the explicit features of both OSPFv3 and EIGRP protocols in the IPv4/IPv6 environment, and more research should be done to explore how to improve the end-to-end IPv6 performance. Also, most related work was performed with an IPv4 environment but lacked studies related to the OSPFv3 virtual network based on an end-to-end IPv6 environment. Hence, this research continues work in previous studies in analyzing IPv6 migration, an OSPFv3 routing experiment based on IPv6, and a ping experiment for IPv4/IPv6 dual-stack networks and IPv6 network for OSPFv3 routing. In the not too distant future, before enabling the default IPv6, it would help to understand network design and deployment based on an IPv6 environment through IPv6 planning and operations for the end-user perspective such as success or failure of connection on IPv6 migration, exploration of an OSPFv3 routing circuit based on an end-to-end IPv6 environment, and a ping experiment for IPv4/IPv6 dual-stack networks and IPv6 network for OSPFv3 routing. We were able to observe an optimal route for modeling of an end-to-end virtual network through simulation results as well as find what appeared to be a fast ping response time VC server to ensure Internet quality of service better than an HTTP server.

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

A 10b 25MS/s $0.8mm^2$ 4.8mW 0.13um CMOS ADC for Digital Multimedia Broadcasting applications (DMB 응용을 위한 10b 25MS/s $0.8mm^2$ 4.8mW 0.13um CMOS A/D 변환기)

  • Cho, Young-Jae;Kim, Yong-Woo;Lee, Seung-Hoon
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.11 s.353
    • /
    • pp.37-47
    • /
    • 2006
  • This work proposes a 10b 25MS/s $0.8mm^2$ 4.8mW 0.13um CMOS A/D Converter (ADC) for high-performance wireless communication systems such as DVB, DAB and DMB simultaneously requiring low voltage, low power, and small area. A two-stage pipeline architecture minimizes the overall chip area and power dissipation of the proposed ADC at the target resolution and sampling rate while switched-bias power reduction techniques reduce the power consumption of analog amplifiers. A low-power sample-and-hold amplifier maintains 10b resolution for input frequencies up to 60MHz based on a single-stage amplifier and nominal CMOS sampling switches using low threshold-voltage transistors. A signal insensitive 3-D fully symmetric layout reduces the capacitor and device mismatch of a multiplying D/A converter while low-noise reference currents and voltages are implemented on chip with optional off-chip voltage references. The employed down-sampling clock signal selects the sampling rate of 25MS/s or 10MS/s with a reduced power depending on applications. The prototype ADC in a 0.13um 1P8M CMOS technology demonstrates the measured DNL and INL within 0.42LSB and 0.91LSB and shows a maximum SNDR and SFDR of 56dB and 65dB at all sampling frequencies up to 2SMS/s, respectively. The ADC with an active die area if $0.8mm^2$ consumes 4.8mW at 25MS/s and 2.4mW at 10MS/s at a 1.2V supply.

An Empirical Study on the Factors Affecting RFID Adoption Stage with Organizational Resources (조직의 자원을 고려한 RFID 도입단계별 영향요인에 관한 실증연구)

  • Jang, Sung-Hee;Lee, Dong-Man
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.125-150
    • /
    • 2009
  • RFID(Radio Frequency IDentification) is a wireless frequency of recognition technology that can be used to recognize, trace, and identify people, things, and animals using radio frequency(RF). RFID will bring about many changes in manufacturing and distributions, among other areas. In accordance with the increasing importance of RFID techniques, great advancement has been made in RFID studies. Initially, the RFID research started as a research literature or case study. Recently, empirical research has floated on the surface for announcement. But most of the existing researches on RFID adoption have been restricted to a dichotomous measure of 'adoption vs. non-adoption' or adoption intention. In short, RFID research is still at an initial stage, mainly focusing on the research of the RFID performance, integration, and its usage has been considered dismissive. The purpose of this study is to investigate which factors are important for the RFID adoption and implementation with organizational resources. In this study, the organizational resources are classified into either finance resources or IT knowledge resources. A research model and four hypotheses are set up to identify the relationships among these variables based on the investigations of such theories as technological innovations, adoption stage, and organizational resources. In order to conduct this study, a survey was carried out from September 27, 2008 until October 23, 2008. The questionnaire was completed by 143 managers and workers from physical distribution and manufacturing companies related to the RFID in South Korea. 37 out of 180 surveys, which turned out unfit for the study, were discarded and the remaining 143(adoption stage 89, implementation stage 54) were used for the empirical study. The statistics were analyzed using Excel 2003 and SPSS 12.0. The results of the analysis are as follows. First, the adoption stage shows that perceived benefits, standardization, perceived cost savings, environmental uncertainty, and pressures from rival firms have significant effects on the intent of the RFID adoption. Further, the implementation stage shows that perceived benefits, standardization, environmental uncertainty, pressures from rival firms, inter-organizational cooperation, and inter-organizational trust have significant effects on the extent of the RFID use. In contrast, inter-organizational cooperation and inter-organizational trust did not show much impact on the intent of RFID adoption while perceived cost savings did not significantly affect the extent of RFID use. Second, in the adoption stage, financial issues had adverse effect on both inter-organizational cooperation and the intent against the RFID adoption. IT knowledge resources also had a deterring effect on both perceived cost savings and the extent of the RFID adoption. Third, in the implementation stage, finance resources had a moderate effect on environmental uncertainty and extent of RFID use while IT knowledge resources had also a moderate effect on perceived cost savings and the extent of the RFID use. Limitations and future research issues can be summarized as follows. First, it is difficult to say that the sample is large enough to be representative of the population. Second, because the sample of this study was conducted among manufacturers only, it may be limited in analyzing fully the effect on the industry as a whole. Third, in consideration of the fact that the organizational resources in the RFID study require a great deal of researches, this research may deem insufficient to fulfill the purpose that it initially set out to achieve. Future studies using performance research are, therefore, needed to help better understand the organizational level of the RFID adoption and implementation.

An Empirical Study on the Influencing Factors of Perceived Job Performance in the Context of Enterprise Mobile Applications (업무성과에 영향을 주는 업무용 모바일 어플리케이션의 주요 요인에 관한 연구)

  • Chung, Sunghun;Kim, Kimin
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.31-50
    • /
    • 2014
  • The ubiquitous accessibility of information through mobile devices has led to an increased mobility of workers from their fixed workplaces. Market researchers estimate that by 2016, 350 million workers will be using their smartphones for business purposes, and the use of smartphones will offer new business benefits. Enterprises are now adopting mobile technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness, and cultivate their innovativeness. For these reasons, various organizational aspects concerning "mobile work" have received a great deal of recent attention. Moreover, many CIOs plan to allocate a considerable amount of their budgets mobile work environments. In particular, with the consumerization of information technology, enterprise mobile applications (EMA) have played a significant role in the explosive growth of mobile computing in the workplace, and even in improving sales for firms in this field. EMA can be defined as mobile technologies and role-based applications, as companies design them for specific roles and functions in organizations. Technically, EMA can be defined as business enterprise systems, including critical business functions that enable users to access enterprise systems via wireless mobile devices, such as smartphones or tablets. Specifically, EMA enables employees to have greater access to real-time information, and provides them with simple features and functionalities that are easy for them to complete specific tasks. While the impact of EMA on organizational workers' productivity has been given considerable attention in various literatures, relatively little research effort has been made to examine how EMA actually lead to users' job performance. In particular, we have a limited understanding of what the key antecedents are of such an EMA usage outcome. In this paper, we focus on employees' perceived job performance as the outcome of EMA use, which indicates the successful role of EMA with regard to employees' tasks. Thus, to develop a deeper understanding of the relationship among EMA, its environment, and employees' perceived job performance, we develop a comprehensive model that considers the perceived-fit between EMA and employees' tasks, satisfaction on EMA, and the organizational environment. With this model, we try to examine EMA to explain how job performance through EMA is revealed from both the task-technology fit for EMA and satisfaction on EMA, while also considering the antecedent factors for these constructs. The objectives of this study are to address the following research questions: (1) How can employees successfully manage EMA in order to enhance their perceived job performance? (2) What internal and/or external factors are important antecedents in increasing EMA users' satisfaction on MES and task-technology fit for EMA? (3) What are the impacts of organizational (e.g. organizational agility), and task-related antecedents (e.g., task mobility) on task-technology fit for EMA? (4) What are the impacts of internal (e.g., self-efficacy) and external antecedents (e.g., system reputation) for the habitual use of EMA? Based on a survey from 254 actual employees who use EMA in their workplace across industries, our results indicate that task-technology fit for EMA and satisfaction on EMA are positively associated with job performance. We also identify task mobility, organizational agility, and system accessibility that are found to be positively associated with task-technology fit for EMA. Further, we find that external factor, such as the reputation of EMA, and internal factor, such as self-efficacy for EMA that are found to be positively associated with the satisfaction of EMA. The present findings enable researchers and practitioners to understand the role of EMA, which facilitates organizational workers' efficient work processes, as well as the importance of task-technology fit for EMA. Our model provides a new set of antecedents and consequence variables for a TAM involving mobile applications. The research model also provides empirical evidence that EMA are important mobile services that positively influence individuals' performance. Our findings suggest that perceived organizational agility and task mobility do have a significant influence on task-technology fit for EMA usage through positive beliefs about EMA, that self-efficacy and system reputation can also influence individuals' satisfaction on EMA, and that these factors are important contingent factors for the impact of system satisfaction and perceived job performance. Our findings can help managers gauge the impact of EMA in terms of its contribution to job performance. Our results provide an explanation as to why many firms have recently adopted EMA for efficient business processes and productivity support. Our findings additionally suggest that the cognitive fit between task and technology can be an important requirement for the productivity support of EMA. Further, our study findings can help managers in formulating their strategies and building organizational culture that can affect employees perceived job performance. Managers, thus, can tailor their dependence on EMA as high or low, depending on their task's characteristics, to maximize the job performance in the workplace. Overall, this study strengthens our knowledge regarding the impact of mobile applications in organizational contexts, technology acceptance and the role of task characteristics. To conclude, we hope that our research inspires future studies exploring digital productivity in the workplace and/or taking the role of EMA into account for employee job performance.

Performance Analysis of Implementation on IoT based Smart Wearable Mine Detection Device

  • Kim, Chi-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.51-57
    • /
    • 2019
  • In this paper, we analyzed the performance of IoT based smart wearable mine detection device. There are various mine detection methods currently used by the military. Still, in the general field, mine detection is performed by visual detection, probe detection, detector detection, and other detection methods. The detection method by the detector is using a GPR sensor on the detector, which is possible to detect metals, but it is difficult to identify non-metals. It is hard to distinguish whether the area where the detection was performed or not. Also, there is a problem that a lot of human resources and time are wasted, and if the user does not move the sensor at a constant speed or moves too fast, it is difficult to detect landmines accurately. Therefore, we studied the smart wearable mine detection device composed of human body antenna, main microprocessor, smart glasses, body-mounted LCD monitor, wireless data transmission, belt type power supply, black box camera, which is to improve the problem of the error of mine detection using unidirectional ultrasonic sensing signal. Based on the results of this study, we will conduct an experiment to confirm the possibility of detecting underground mines based on the Internet of Things (IoT). This paper consists of an introduction, experimental environment composition, simulation analysis, and conclusion. Introduction introduces the research contents such as mines, mine detectors, and research progress. It consists of large anti-personnel mine, M16A1 fragmented anti-mine, M15 and M19 antitank mines, plastic bottles similar to mines and aluminum cans. Simulation analysis is conducted by using MATLAB to analyze the mine detection device implementation performance, generating and transmitting IoT signals, and analyzing each received signal to verify the detection performance of landmines. Then we will measure the performance through the simulation of IoT-based mine detection algorithm so that we will prove the possibility of IoT-based detection landmine.

The Analysis of Estrus Behavior and the Evaluation of Conditions Required for Improving Reproductive Efficiency in Holstein Dairy Cows using a Heat Detector (발정탐색기를 이용한 Holstein 젖소의 발정행동 분석 및 번식효율 향상을 위한 조건의 평가)

  • Baek, Kwang-Soo;Lee, Wang-Shik;Son, Jun-Kyu;Lim, Hyun-Joo;Yoon, Ho-Beak;Kim, Tae-Il;Hur, Tai-Young;Choe, Chang-Yong;Jung, Young-Hun;Kwon, Eung-Gi;Jung, Yeon-Sub;Kim, Sun-Kyu;Won, Jeong-Il
    • Journal of Embryo Transfer
    • /
    • v.28 no.3
    • /
    • pp.177-184
    • /
    • 2013
  • The objective of this study was to analyze the accuracy of estrus detection of heat detector and analysis of estrus behavior (mounting and mounted), and the evaluation of conditions required for improving reproductive efficiency in Holstein dairy cows fitted with a estrous detector. The heat detection system consists of estrous detector based on wireless sensor and an electric bulletin board displayed estrus behavior data. When cow mounting other cows, the accuracy of estrus behavior displayed an electric bulletin board were 87.5% (mounting other cows only), 100% (mounting other cows but not standing), 80.0% (mounting other cows with standing for 1~4 seconds), 90.0% (mounting other cows but not standing for 1~4 seconds), 80% (mounting other cows with standing for more than 5 seconds) and 90.0% (mounting other cows but not standing for more than 5 seconds). When cow mounted other cows, the accuracy of estrus behavior displayed an electric bulletin board were 100% (mounted other cows but not standing), 100% (mounted other cows with standing for 1~4 seconds), 100% (mounted other cows but not standing for 1~4 seconds) and 100% (mounted other cows with standing for more than 5 seconds). Circadian distribution of first observed in estrus were 59.1% (am 8~pm 6) and 40.9% (pm 6~am 8). Distribution for the number of estrus behavior were 40.9% (less than 3 times), 36.4% (4~6 times) and 22.7% (more than 4 times). The conception rates relative to interval from first estrus behavior to insemination for estrus periods were 23.1% (less than 11 hours) and 55.6% (12~20 hours).

Compression Sensing Technique for Efficient Structural Health Monitoring - Focusing on Optimization of CAFB and Shaking Table Test Using Kobe Seismic Waveforms (효율적인 SHM을 위한 압축센싱 기술 - Kobe 지진파형을 이용한 CAFB의 최적화 및 지진응답실험 중심으로)

  • Heo, Gwang-Hee;Lee, Chin-Ok;Seo, Sang-Gu;Jeong, Yu-Seung;Jeon, Joon-Ryong
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.24 no.2
    • /
    • pp.23-32
    • /
    • 2020
  • The compression sensing technology, CAFB, was developed to obtain the raw signal of the target structure by compressing it into a signal of the intended frequency range. At this point, for compression sensing, the CAFB can be optimized for various reference signals depending on the desired frequency range of the target structure. In addition, optimized CAFB should be able to efficiently compress the effective structural answers of the target structure even in sudden/dangerous conditions such as earthquakes. In this paper, the targeted frequency range for efficient structural integrity monitoring of relatively flexible structures was set below 10Hz, and the optimization method of CAFB for this purpose and the seismic response performance of CAFB in seismic conditions were evaluated experimentally. To this end, in this paper, CAFB was first optimized using Kobe seismic waveform, and embedded it in its own wireless IDAQ system. In addition, seismic response tests were conducted on two span bridges using Kobe seismic waveform. Finally, using an IDAQ system with built-in CAFB, the seismic response of the two-span bridge was wirelessly obtained, and the compression signal obtained was cross-referenced with the raw signal. From the results of the experiment, the compression signal showed excellent response performance and data compression effects in relation to the raw signal, and CAFB was able to effectively compress and sensitize the effective structural response of the structure even in seismic situations. Finally, in this paper, the optimization method of CAFB was presented to suit the intended frequency range (less than 10Hz), and CAFB proved to be an economical and efficient data compression sensing technology for instrumentation-monitoring of seismic conditions.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.