• Title/Summary/Keyword: Wireless Communication Environment

Search Result 1,483, Processing Time 0.022 seconds

Designed and Development of Location Tracking System by The Short-Range Radio Frequency Relay Algorithm (근거리 RF중계알고리즘에 의한 구내 위치추적시스템 연구)

  • Park, Sang-Min;Lee, Gong;Lee, Sang-Keun
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.73-81
    • /
    • 2008
  • We can find easily about researches or technical development that deal with grasping the location of an object with GPS(Global Positioning System) in order to use them as a useful information. Most researches or technical development on application of tracing have been developed for the purpose of tracing objects in broad area as physical distribution or transportation, but recently, there are many researches on tracing materials in premise area as a fork lift, carts, or the equipment of work. In general, a system that utilizes location information of objects needs data communication network to transmit location data and it ensures data communication network by using common networks(SK, LG, KFT) or wireless LAN. However these two methods need monthly payment for the rental fee or require considerable amount of investment for the early stage so it is difficult to use them merely for tracing premise subjects. This study was conducted to build a tracing system for premise area by local area RF relay algorithm with low cost applying RF relay algorithm to local area wireless communication(ZIGBEE, 424MHz, Bluetooth, 900MHz) system in order to supplement these demerits and included relay algorithm, RF locating information terminal, local area RF gab-fillers, a plan for collection server of locating information, and the way of realization as they are needed in this system. I consider that this study would be applicable with flexibility in the industry area that needs tracing solution within a specific area or needs ensuring data communication network, to transmit data in ubiquitous environment, by easier and more rapid way with lower cost.

  • PDF

Performance Analysis of RFID Interference Suppression System Based on the Gold Code (골드 코드 기반의 RFID 간섭제거 시스템 성능분석)

  • khadka, Grishma;Hwang, Suk-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1491-1497
    • /
    • 2013
  • Radio frequency identification (RFID) is an important and essential components of ubiquitous computing, with the development of wireless communication technologies and mobile computing environment. Recently, RFID becomes the mainstream application that helps fast handling and uniquely identifying the physical objects. It utilizes the electromagnetic energy for data transmission from a tag to a reader in the presence of arbitrary interference and noise. In order to employ the portable mobile RFID reader, a tag-collision problem between two or more adjacent tags should be considered. In this paper, we present the operation of RFID system in which numerous tags are present in the interrogation zone of a single reader at the same time. Since there may exist a number of tagged objects in the narrow area, multiple RFID tags may interfere each other, caused to degrade the data reliability and efficiency of the RFID system. In order to suppress interference signals from multiple neighboring tags, we present an application of Gold code for RFID communication system, which uses spread spectrum technique. In this RFID system, data bits are spreaded in each tags with the unique Gold code and the spreaded data bits are despreaded in the reader with the same Gold code. The performance analysis of the considered RFID anti-collision system is illustrated via computer simulation examples.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

A Study on Smart Soil Resistance Measuring Device for Safety Characterized Ground Design in Converged Information Technology (ICT 융합 환경에서의 안전 특성화 접지 설계를 위한 스마트 대지 저항 측정 기술에 관한 연구)

  • Kim, Hong-Yong;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.203-209
    • /
    • 2019
  • In this work, a new land-specific resistance measuring device (GM) and a measuring probe (Grounding Rod) are connected to the WENNER quadrant as power-line communication (PLC). In groups of two (P1,P2) probes, five to ten probes are installed in series on the ground at intervals of 1m, 2m, 4m, 8m, and 16m, respectively. If the PLC signal from the GMD is detected by the receiver of the Probe 1 (P1) for measurement, the minute voltage and current for measurement flow from the PSD (power supply) attached to the probe to the ground, and then, through the soil between P1 and P2, enters the Probe 1 (P2). The resistance value is then measured by the principle of voltage drop due to ground resistance. Measure the earth resistance every T seconds up to 1 trillion and store the measured data on the Arduino Server mounted on the main equipment. Stored measurement data can be derived from formulas by Ohm's Law and from inherent resistance (here,). Data obtained in real time will be linked to CDGES programs installed on Main PC, enabling data analysis and real-time monitoring of the ground environment on land. In addition, a three-dimensional display is possible with 3D graph support by identifying seasonal characteristics such as temperature and humidity of land (soils). The limitations of the study will require specific application measures of Test Bed for commercial access to a model that has been developed and operated experimentally.

Performance of IEEE 802.11b WLAN Standard at In-Vehicle Environment for Intelligent U-Car System (지능형 U-Car에서 IEEE 802.11b을 이용한 차량 내 데이터 무선 랜 전송 성능 분석)

  • Lee Seung-Hwan;Heo Soo-Jung;Park Yong-Wan;Lee Sang-Shin;Lee Dong-Hahk;Yu Jae-Hwang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.80-87
    • /
    • 2006
  • In this paper, we analyze the performance of IEEE 802.11b WLAN communication between access point(AP) and mobile equipment(ME) in 2.4 GHz band with noise and interference factors. WLAN communication at in-vehicle environment is assumed as the communication between main vehicle controller and electronic device such as sensor, ECU (Electrical Control Unit) in vehicle on telematics field for implementing wireless vehicle control system. Received interference level from other system's mobile equipment in the same band and automobile noise from each part of vehicle can be the main factors that can cause increasing error rate of control signal. With these (actors, we focus on the Eb/No the BER performance of WLAN for analyzing the characteristic of interference factors by the measured bit error rate.

Key Exchange Protocol based on Signcryption in SMART Highway (SMART Highway 환경에서의 사인크립션 기반 키 교환 프로토콜)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.2
    • /
    • pp.180-189
    • /
    • 2013
  • The SMART Highway project combines road construction with advanced technology and vehicle telecommunications. Its expected outcome is a world-leading intelligent road that is green, fast, and comfortable. A vehicular ad-hoc network(VANET) is the core technology of the SMART Highway, whose transport operation is based on road vehicles. The VANET is a next-generation networking technology that enables wireless communication between vehicles or between vehicles and a road side unit(RSU). In the VANET system, a vehicle accident is likely to cause a serious disaster. Therefore, some information on safety is essential to serve as the key exchange protocol for communication between vehicles. However, the key exchange scheme of the general network proposed for a fast-moving communication environment is unsuitable for vehicles. In this paper, communication between multiple vehicles more efficient and secure key exchange at the vehicle certification by signcryption is proposed.

Implement for EzPlay and PC-EPG of Multimedia Remote Control System (EzPlay/EPG를 적용한 멀티미디어 원격제어 시스템 구현)

  • Park Nho-Kyung;Jin Hun-Jun;Kim Sang-Pok;Park Sang-Bong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.2 s.302
    • /
    • pp.39-48
    • /
    • 2005
  • In this paper, we implement the multimedia remote control system by using existing internet service or wired online. We also provide user-friendly convenient environment with developed application program named EzPlay and PC-EPG. The multimedia remote control system consists of integrated wireless transceiver of PC and TV connected USB type and the users can easily use lots of contents because EzPlay program provides appropriate UI mode on the PC and TV screen. The unposed system can operate real-time playing, reserved video receding and data storing function using internet mesh based on signal detecting control theory. The PC-EPG system is implemented by server/client web program and the client program based on visual C++/MFC processes data storing in client computer through TCP/IP. It also provides intelligent function that constructs database according to user's preference.

Effective Error Detection Method for Video using Fragile Watermark (연성 워터마크를 이용한 비디오의 효율적인 에러 검출 방법)

  • Hwang, Young-Hooi;Jeon, Byeung-Woo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.6
    • /
    • pp.602-611
    • /
    • 2002
  • Recent advances in technology have resulted in rapid growth in mobile communication. With this explosive growth, reliable transmission and error resilient technique become increasingly necessary to offer high quality multimedia service. The success of error resilient techniques at decoder sensitively depends on error detection performance. Therefore, this paper proposes a computationally very simple and efficient error detection technique using fragile watermark for real-time video communication. To balance between image quality degradation and error detection efficiency, fragile watermark is embedded only in least significant bits of selected transform coefficients. The proposed method is workable without additional bit in video bitstream and can be implemented very efficiently. This method will be useful in video communication in error prone environment such as wireless channel.

Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment (U-Health환경에서 안전한 개인정보 관리를 위한 통합 인증스키마 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3865-3871
    • /
    • 2014
  • The U-health service provides medical services with patients anytime or anywhere and is defined as the service that combines information and communication technology with health and medical service. However, it causes some troubles, such as the disclosure of patients' medical information or data spills (personal information extrusion). Moreover, it has the weak point of the security threats associated with data based on existing wire-wireless systems because it conducts data transmission and reception through the network. Therefore, this paper suggests a safe personal information management system by designing integrated certification schema that will help compensate for the weaknesses of the U-health service. In the proposal, the protocols for user information, certification between medical institution and users, data communication encryption & decryption, and user information disuse were designed by applying the ID-Based Encryption, and analyzed such existing systems and PKI Based-based communication process, securely and safely.

Implementation of Medical Diagnostic Information System and Conformance Test of Medical Image in Mobile Environment (모바일 환경에서 의료 진단 정보 시스템의 구현 및 의료 영상의 적합성 평가)

  • Cho, Chung-Ho;Kim, Gwang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.6
    • /
    • pp.713-720
    • /
    • 2015
  • As the hand-held mobile devices are widely used, they are recently coming into convergence with medical diagnostic systems. Furthermore, the wireless mobile Internet and the various kinds of communication devices are rapidly coming into wide use converging with medical technology. The mobile communication environments can make people get more health care services beyond space and time. In this paper, we implement and evaluate the mobile client and the medical diagnostic information server for transmitting, searching and updating the medical diagnostic information. The DICOM CT image and the compressed JPEG 2000 CT image are statistically evaluated by t-test performance whether those images are clinically appropriate. In the case of the DICOM CT image, we realize that the average value is relatively more appropriate to the clinical diagnosis than the JPEG 2000 CT image.