• Title/Summary/Keyword: Wireless Communication Environment

Search Result 1,486, Processing Time 0.027 seconds

Design and Implementation of a Telematics Service Framework for Open Services in the Heterogeneous Network Environment (이기종 네트워크 환경에서 개방형 서비스를 위한 텔레매틱스 서비스 프레임워크 설계 및 구현)

  • Lee, Deuk-Woo;Kang, Hong-Koo;Han, Ki-Joon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.2
    • /
    • pp.137-148
    • /
    • 2009
  • Recently, as technology for obtaining locational awareness and wireless telecommunications improve, technologies and services involving Telematics has grown rapidly. However, the services are currently available on certain terminals selected by the telematics service provider (TSP). This means in order to access services provided by other TSPs, it is necessary to purchase related terminals. To solve this problem, it is essential to achieve service interoperability between TSPs, or between TSPs and the contents provider (CP). Under this backdrop, the aim of this paper is to design and implement a telematics service framework for openning services in a heterogeneous network environment. Futhermore, the paper presents open telematics protocols required for communication in the telematics service framework, and develop technologies to deal with this in different network environments.

  • PDF

Performance analysis of an experimental plant factory

  • Ryu, Dong-Ki;Kang, Sin-Woo;Chung, Sun-Ok;Hong, Soon-Jung
    • Korean Journal of Agricultural Science
    • /
    • v.40 no.4
    • /
    • pp.395-403
    • /
    • 2013
  • Plant factory has drawn attention in many countries in the world due to capability of environmental control not only for better yield and quality, but also for increase in functional and medicinal components of the products. In this paper, an experimental plant factory was constructed for various tests under different environmental conditions, and the operations were evaluated. A production room was constructed with adiabatic materials with dimensions of $6,900{\times}3,000{\times}2,500$ mm ($L{\times}W{\times}H$). Four sets of $2,890{\times}600{\times}2,320$ mm ($L{\times}W{\times}H$) production frame unit, each with 9 light-installed beds and an aeroponic fertigation system, resulting in 36 beds, were prepared. Accuracy and response were evaluated for each environmental control component with and without crops. Air temperature, humidity, $CO_2$ concentration, light intensity, frequency, and duty ratio, fertigation rate and scheduling were controllable from a main control computer through wireless communication devices. When the plant factory was operated without crop condition, the response times were 8 minutes for change in temperature from 20 to $15^{\circ}C$ and 20 minutes from 15 to $20^{\circ}C$; 7 minutes for change in humidity from 40 to 65%; and 4 minutes for change in $CO_2$ concentration from 450 to 1000 ppm. When operated for 24 hours with crop cultivation; average, maximum, and minimum values of temperatures were 20.06, 20.8, and $18.8^{\circ}C$; humidity were 66.72, 69.37, and 63.73%; $CO_2$ concentrations were 1017, 1168, and 911 ppm, respectively. Photosynthetic Photon Flux Density was increased as the distance from the light source decreased, but variability was greater at shorter distances. Results of the study would provide useful information for efficient application of the plant factory and to investigate the optimum environment for crop growth through various experiments.

Study to safely transmit encrypted images from various noises in space environment

  • Kim, Ki-Hwan;Lee, Hoon Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.97-104
    • /
    • 2020
  • In this paper, we propose a random number generator PP(PingPong256) and a shuffle technique to improve the problem that the encrypted image is damaged due to a lot of noise by the channel coding of wireless communication recommended in the special environment of space. The PP can constantly generate random numbers by entering an initial value of 512 bits. Random numbers can be encrypted through images and exclusive logical computations. Random numbers can be encrypted through images and exclusive logical computations. The shuffle technique randomly rearranges the image pixel positions while synchronizing the image pixel position and the random number array position and moving the random number arrangement in ascending order. Therefore, the use of PP and shuffle techniques in channel coding allows all pixels to be finely distributed and transmit high-quality images even in poor transmission environments.

Autonomous Self-Estimation of Vehicle Travel Times in VANET Environment (VANET 환경에서 자율적 자가추정(Self-Estimation) 통행시간정보 산출기법 개발)

  • Im, Hui-Seop;O, Cheol;Gang, Gyeong-Pyo
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.4
    • /
    • pp.107-118
    • /
    • 2010
  • Wireless communication technologies including vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) enable the development of more sophisticated and effective traffic information systems. This study presents a method to estimate vehicular travel times in a vehicular ad hoc network (VANET) environment. A novel feature of the proposed method is estimating individual vehicle travel times through advanced on-board units in each vehicle, referred to as self-estimated travel time in this study. The method uses travel information including vehicle position and speed at each given time step transmitted through the V2V and V2I communications. Vehicle trajectory data obtained from the VISSIM simulator is used for evaluating the accuracy of estimated travel times. Relevant technical issues for successful field implementation are also discussed.

A Naming Application Model for Sensor Networks (센서 네트워크를 위한 네이밍 응용 모델)

  • Kim, Young-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3183-3192
    • /
    • 2009
  • The purpose of this paper is to introduce Naming application model for sensor networks. Currently, sensor networks comprised of sensor nodes have provided an application range which could not function before. However, unlike general network, current sensor networks are designed to cooperate with major wireless-capable sensor devices with limited resources. Thus, exporting/importing between individual sensor and current sensor networks is very inefficient and unstable. Attribute, schema and DIT(Directory Information Tree) must be designed for sensor network using SN LDAP application model in order to maintain transparency and provide constant service in a situation of data defect. With the system explained as above, Naming application model is made to manage SN Fuzzy Query. It shall be more efficient and stable structure as long as Naming application using a virtual equation in a certain environment with information collected from sensor node is provided. In this paper, I would like to introduce SN Fuzzy LDAP model for sensor network by quick Naming method. Also, naming application which is possible for fuzzy query in a certain environment based on the system will be proved.

Data Transmission Method using Broadcasting in Bluetooth Low Energy Environment (저전력 블루투스 환경에서 브로드캐스팅을 이용한 데이터전송 방법)

  • Jang, Rae-Young;Lee, Jae-Ung;Jung, Sung-Jae;Soh, Woo-Young
    • Journal of Digital Contents Society
    • /
    • v.19 no.5
    • /
    • pp.963-969
    • /
    • 2018
  • Wi-Fi and Bluetooth technologies are perhaps the most prominent examples of wireless communication technologies used in the Internet of Things (IoT) environment. Compared to widely used Wi-Fi, Bluetooth technology has some flaws including 1:1 connection (one-way) between Master and Slave, slow transmission, and limited connection range; Bluetooth is mainly used for connecting audio devices. Since the release of Bluetooth Low Energy (BLE), some of the flaws of Bluetooth technology have been improved but it still failed to become a competitive alternative of Wi-Fi. This paper presents a method of data transmission through broadcasting in BLE and demonstrates its performance, one-to-many data transfer result. The Connection-Free Data Transmission proposed in this paper will hopefully be utilized in special circumstances requiring 1:N data transmission or disaster security network.

Multiplication optimization technique for Elliptic Curve based sensor network security (Elliptic curve기반 센서네트워크 보안을 위한 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1836-1842
    • /
    • 2010
  • Sensor network, which is technology to realize the ubiquitous environment, recently, could apply to the field of Mechanic & electronic Security System, Energy management system, Environment monitoring system, Home automation and health care application. However, feature of wireless networking of sensor network is vulnerable to eavesdropping and falsification about message. Presently, PKC(public key cryptography) technique using ECC(elliptic curve cryptography) is used to build up the secure networking over sensor network. ECC is more suitable to sensor having restricted performance than RSA, because it offers equal strength using small size of key. But, for high computation cost, ECC needs to enhance the performance to implement over sensor. In this paper, we propose the optimizing technique for multiplication, core operation in ECC, to accelerate the speed of ECC.

The Vertical Handover Between WLAN and UMTS using Group Decision Making Method (그룹결정방법을 이용한 WLAN과 UMTS간의 수직 핸드오버)

  • Kim, Nam-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.9
    • /
    • pp.4492-4497
    • /
    • 2013
  • An important features of next-generation wireless networks will be heterogeneous environment in which a mobile terminal will be able to connect to multiple radio access networks and network selection mechanisms play an important role in ensuring QoS for users in this environment. In this paper, our study is concerned with an extension of the well known AHP to the group decision making methods. The users requested specific QoS divide into a group and the access networks with similar characteristics split into a group. Between each group, the one group is selected and within that group, the best access networks will be assigned according to priority order by network selection algorithm. The experimental results of MATLAB simulation show that the every user in each services can select the same network with decision value as large as 0.9. Consequently, the proposed network selection mechanism is more effective than conventional one in integrated UMTS and WLAN networks.

Comparison of propagation models based on DTV field strength measurement in urban environment (대도심 DTV 전계강도 측정에 기반한 전파예측 모델 비교)

  • Kang, Young-Heung;Kwon, Yong-Ki;Kim, Hyeong-Seob
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.5
    • /
    • pp.484-490
    • /
    • 2013
  • With the rapid development of wireless communication at VHF and UHF bands, there is an increasing need for the reliable propagation prediction tools. Therefore, the different propagation models that have been developed in many countries as well as korea has been trying to secure a model suitable for their geographical area but then it is giving us a different result when we compared it to measured values. In this paper, based on the measurements of DTV broadcasting services in domestic urban area, analysis and comparison of ITU-R P.1546 and BCAST models provide errors between measured and predicted values, and some points for improving SMI system has been proposed. As a result, P.1546 model provides the valid predicted data similar to measured data, but BCAST model has some problems of large deviation and higher prediction to measured data. In future, these problems and diffractions due to high buildings need to be studied further.

A Study on Network Service Using Authorization Ticket in AAA system (AAA시스템의 인가 티켓을 이용한 네트워크 서비스에 관한 연구)

  • Kang, Seo-Il;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.11-19
    • /
    • 2007
  • A ubiquitous network environment is a system where the user can avail of the network's services anytime, anywhere. To establish such an environment, studies continue being conducted on wireless communication technology and mobile terminals. The company that provides such services should have an established system for authentication, authorization and charging for users. This service is referred to as Authentication, Authorization, Accounting(AAA), and its aspects have been consistently studied. On the other hand, existing studies have been promoted with regard to the authentication and efficiency of the mobile terminal. One of the method is that the mobile terminal contacts to the home authentication server through the external authentication server every time it is required and; another one is to use a medium server to provide authentication in the middle between them. Thus, this study aims to determine the best method to use ticketing, where tickets are provided through a mobile terminal, complete with authentication and authorization features. Also, as it uses ticket, it can efficiently provide mobile verification processing.