• Title/Summary/Keyword: Wireless Communication Environment

Search Result 1,483, Processing Time 0.027 seconds

Design and Fabrication of Base Station Antenna for ETCS based on DSRC (DSRC 기반의 ETCS 기지국 안테나 설계 및 제작)

  • Ko Jin-Hyun;Kim Nam-Ki;Ha Jae-Kwon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.3 no.1 s.4
    • /
    • pp.75-83
    • /
    • 2004
  • This paper describes the design, fabrication, and measurement of a low side lobe antenna for RSE base station of the ETCS which is one of the ITS services. The antenna is installed on the gantry of road side and provides the wireless communication lint between vehicles and RSE. The required characteristics of ETCS base station antenna are low sidelobe and specific beam pattern by the road and install environment and installed place of OBU. To minimize the affects of multipath signal by reflection, Circular polarization is required. To get low sidelobe of antenna, array configuration and weighting factor by Taylor distribution in radiator elements are applied. The measured results of fabricated antenna are as follows; return loss of 130MHz by -10dB, an axial ratio of 2.6dB, and a gain of 17dBi. It is found that the measured beam patterns are similar to design results.

  • PDF

Fabrication and Application of BIS Base Station Antenna in Jeon-Ju City (전주시 BIS 기지국용 안테나 제작 및 활용)

  • Ko JinHyun;Park JooMoon;Ha Jaekwon;Park DukKyu
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.3 no.2 s.5
    • /
    • pp.95-104
    • /
    • 2004
  • This paper describes the design, fabrication, and measurement of a omni-directional beam pattern antenna for base station of the BIS which is one of the ITS services. The antenna is installed on the signal lamp of important crossroad and provides the wireless communication link between vehicles and RSE(Road Side Equipment). The required characteristics of BIS base station antenna are omni-directional beam pattern and specific beam pattern by the road and install environment and installed place of OBU. To get omni-directional beam pattern of antenna, Array configuration and OMA are applied. The measured results of fabricated antenna are as follows; return loss of 640MHz by -10 dB, and a gain of 10.3dBi. It is found that the measured beam patterns are similar to design results.

  • PDF

A Data Driven Index for Convergence Sensor Networks (융합 센서 네트워크를 위한 데이터 기반 색인)

  • Park, Jeong-Seok
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.43-48
    • /
    • 2016
  • Wireless sensor networks (WSN) can be more reliable and easier to program and use with the help of sensor database management systems (SDMS). SDMS establish a user-friendly SQL-based interface to process declarative user-defined queries over sensor readings from WSN. Typical queries in SDMS are ad-hoc snapshot queries and long-running, continuous queries. In SDMSs queries are flooded to all nodes in the sensor net, and query results are sent back from nodes that have qualified results to a base station. For query flooding to all nodes, and result flooding to the base station, a lot of communication energy consuming is required. This paper suggests an efficient in-network index solution, named Distributed Information Gathering (DIG) to process range queries in a sensor net environment that can save energy by reducing query and result flooding.

Analysis of Privacy Violation Possibility of Partially Anonymized Big Data (온라인 상에 공개된 부분 익명화된 빅데이터의 프라이버시 침해 가능성 분석)

  • Jung, Kang-soo;Park, Seog;Choi, Dae-seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.665-679
    • /
    • 2018
  • With the development of information and communication technology, especially wireless Internet technology and the spread of smart phones, digital data has increased. As a result, privacy issues which concerns about exposure of personal sensitive information are increasing. In this paper, we analyze the privacy vulnerability of online big data in domestic internet environment, especially focusing on portal service, and propose a measure to evaluate the possibility of privacy violation. For this purpose, we collected about 50 million user posts from the potal service contents and extracted the personal information. we find that potal service user can be identified by the extracted personal information even though the user id is partially anonymized. In addition, we proposed a risk measurement evaluation method that reflects the possibility of personal information linkage between service using partial anonymized ID and personal information exposure level.

The Design and Implementation of a Vehicle Location Tracing System using RM Multi-Session Processing (RM 다중세션 처리를 이용한 차량 추적 시스템의 설계 및 구현)

  • Lee, Yong Kwon;Jang, Chung Ryong;Lee, Dae Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.61-73
    • /
    • 2014
  • An automatic vehicle location tracing system is to build GIS server and on transmission for providing service in various ways by collecting a GPS location information from each vehicle. It is to save GPS data from OBU built-in on the vehicle and transmit the GPS data using the RSU on the roadside and WAVE communication technology. The collected data from the RSU is transmitted to the GIS server and stored in DB(database) and based on the GPS data that was collected from the each vehicle the system is to provide user service to suit the applications so it is to provide various services between RSU and OBU. In this paper, by implementing a multi-session process between the RM and the RMA a variety of services between RSU and OBU are provided. In addition, the system is designed and implemented using GPS to provide a variety of services, for the services provided from each RMA by configuring them as an independent session so it enables a variety of services implemented from one of RSU. With the result of the comparative analysis on the multi-session processing and single-session processing it shows that the differenes of them are minor in repect of the data loss rate and the data transfer rate but various services can be provided.

An Efficient Authentication Mechanism Strengthen the Privacy Protection in 3G Network (3G 네트워크에서 프라이버시 보호를 강화한 효율적인 인증 메커니즘)

  • Jeon, Seo-Kwan;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.5049-5057
    • /
    • 2010
  • As communication technologies are developed and variety of services to mobile devices are provided, mobile users is rapidly increasing every year. However, mobile services running on wireless network environment are exposed to various security threats, such as illegal tampering, eavesdropping, and disguising identity. Accordingly, the secure mobile communications services to 3GPP were established that the standard for 3GPP-AKA specified authentication and key agreement. But in the standard, sequence number synchronization problem using false base station attack and privacy problem were discovered through related researches. In this paper, we propose an efficient authentication mechanism for enhanced privacy protection in the 3G network. We solve the sequence number synchronization existing 3GPP authentication scheme using timestamp and strengthen a privacy problem using secret token. In addition, the proposed scheme can improve the bandwidth consumption between serving network and home network and the problem of authentication data overhead for the serving network because it uses only one authentication vector.

Study on Power Line Coupler for Auxiliary Power to Overhead Line (철도 전차선의 보조전원을 위한 전력선 커플러 연구)

  • Lee, Gunbok;Yi, Kyung-Pyo;Kim, Myung Yong;Lee, Su Gil;Chang, Sang Hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.7
    • /
    • pp.566-569
    • /
    • 2018
  • A power line coupler that can apply high-frequency power to a railway overhead line structure was analyzed. It is difficult to supply auxiliary power to an overhead line in a high-voltage environment, and doing so requires a long-distance transfer. A method is proposed that utilizes the resonance on the Rogowski coil, which does not use a magnetic core. A simple overhead line structure was fabricated that consisted of a contact wire, messenger wire, and dropper. Couplers of various sizes were fabricated and deployed on the messenger wire, and the transfer characteristics of the two couplers were compared at a distance. As a result of applying the matching circuit to the coupler, the transmission efficiency was 53% at a distance of 2.5 m. The proposed method shows that it is possible to apply the auxiliary power by using the existing conductor in a special structure, such as the overhead line.

Multi-modal Sense based Interface for Augmented Reality in Table Top Display (테이블 탑 디스플레이 기반 증강현실 구현을 위한 다중 감각 지원 인터페이스)

  • Jeong, Jong-Mun;Yang, Hyung-Jeong;Kim, Sun-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.5
    • /
    • pp.708-716
    • /
    • 2009
  • Applications which are implemented on Table Top Display are controlled by hands, so that they support an intuitive interface to users. Users feel the real sense when they interact on the virtual scene in Table Top Display. However, most of conventional augmented reality applications on Table Top Display satisfy only visual sense. In this paper, we propose an interface that supports multi-modal sense in that tactile sense is utilized for augment reality by vibrating a physical control unit when it collides to virtual objects. Users can feel the collision in addition to visual scene. The proposed system facilitates tactile augmented reality through an air hockey game. A physical control unit vibrates when it receives virtual collision data over wireless communication. Since the use of tabletop display environment is extended with a tactile sense based physical unit other than hand, it provides a more intuitive interface.

  • PDF

A Study on User Authentication of Mobile Internet Environment Based on WPKI - (무선 인터넷 환경의 WPKI 기반 사용자 인증에 관한 연구)

  • Lee, Cheol-Seung;Park, Young-Ok;Lee, Ho-Young;Lee, Jeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.560-563
    • /
    • 2003
  • In this paper describes for use Authentication with the WPKI and Kerberos protocol. this paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses wireless public key-based structure and transmission hierarchical security back of a WAP forum, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 with using WIM for complement an authentication protocol Kerberos and its disadvantages.

  • PDF

A Sensor Node Deployment Method Based on Environmental Factors Influencing Sensor Capabilities (센서의 성능에 영향을 미치는 환경 요소들에 기반한 센서 노드 배치 방법)

  • Kim, Dae-Young;Choi, Hyuck-Jae;Lee, Jong-Eon;Cha, Si-Ho;Kang, Seok-Joong;Cho, Kuk-Hyun;Jo, Min-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.894-903
    • /
    • 2008
  • The position of sensors generally affects coverage, communication costs, and resource management of surveillance sensor networks. Thus we are required to place a sensor in the best location. However, it is difficult to consider that terrain and climate factors influencing sensors when sensor nodes are deployed in the real world, such as a mountain area or a downtown area. We therefore require a sensor deployment method for detecting effectively targets of interest in terms of surveillance area coverage in such environment. Thus in this paper, we analyze various environmental factors related to sensor deployment, and quantify these factors to use when we deploy sensors. By considering these quantified factors, we propose a practical and effective method for deploying sensors in terms of sensing coverage. We also demonstrate the propriety of the proposed method through implementing a sensor deployment management system according to the method.