• Title/Summary/Keyword: Wireless DataBroadcasting

Search Result 291, Processing Time 0.023 seconds

A Study on Utilization of NTRIP Data Delivery and Virtual RINEX from Seoul Metro Government Network-RTK System (서울특별시 네트워크 RTK 시스템의 NTRIP 데이터 전송 및 Virtual RINEX의 활용)

  • Gwak, In-Sun;Nam, Dae-Hyun;Kwon, Jay-Hyoun
    • Spatial Information Research
    • /
    • v.18 no.5
    • /
    • pp.1-11
    • /
    • 2010
  • Since January 2009, Seoul Metro Government(SMG) is operating own Network RTK Systems connecting four(4) GNSS Reference Stations which are installed inside Seoul Metro City area. SMG is currently providing VRS data service via wireless internet for Network-RTK and RINEX data observed from GNSS Reference Stations. This paper will discuss utilization of data available from SMG Network-RTK System for various applications, and present the test results on practicalities of Virtual RINEX data. For the utilization of data available from SMG Network- RTK system, 1)NTRIP data delivery of GNSS realtime observables streaming and converting to RINEX at receiving side, 2) monitoring deformation of bulky structures using GNSS observation were discussed. In addition to those discussion, 3) broadcasting VRS correction data for job site via radio modem after acquiring such correction data on-line using NTRIP based GNSS Internet Radio from SMG Network-RTK System were introduced. For the test results on practicalities of Virtual RINEX data, 1) the post-processing results of the GNSS observation data on a certain point with GNSS Reference Station data have been compared to the post-processing results of Virtual RINEX data on the same point generated from SMG Network-RTK System, and 2) VRS RTK positioning results for a certain point and post-processing results of Virtual RINEX data for the point were compared. The results showed only a few mm difference, and the high possibility for using Virtual RINEX data for post-processing applications.

An Index Allocation Method for the Broadcast Data in Mobile Environments with Multiple Wireless Channels (멀티무선채널을 갖는 모바일 환경에서 브로드캐스트 데이타를 위한 인덱스 할당 방법)

  • 이병규;정성원;이승중
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.37-52
    • /
    • 2004
  • Broadcast has been often used to disseminate the frequently requested data efficiently to a large volume of mobile units over a single or multiple channels. Since the mobile units have limited battery power, the minimization of the access time for the broadcast data is an important problem. There have been many research efforts that focus on the improvement if the broadcast techniques by providing indexes on the broadcast data. In this paper, we studied an efficient index allocation method for the broadcast data over multiple physical channels, which cannot be coalesced into a single high bandwidth channel. Previously proposed index allocation techniques either require the equal size of index and data or have a performance degradation problem when the number of given physical channels is not enough. These two problems will result in the increased average access time for the broadcast data. To cope with these problems, we propose an efficient tree- structured index allocation method for the broadcast data with different access frequencies over multiple physical channels. Our method minimizes the average access time for the broadcast data by broadcasting the hot data and their indexes more often than the less hot data and their indexes. We present an in-0e0th experimental and theoretical analysis of our method by comparing it with other similar techniques. Our performance analysis shows that it significantly decrease the average access time for the broadcast data over existing methods.

A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment (스마트 홈 환경에서 AKI기반 검증 시스템을 활용한 인증관리 및 통신 기법에 관한 연구)

  • Jin, Byung Wook;Park, Jung Oh;Jun, Moon Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • With the development of IOT technology and the expansion of ICT services recently, a variety of home network services have been advanced based on wired and wireless high speed telecommunication. Domestic and global companies have been studying on the innovative technology for the users using IOT based technology and the environment for the smart home services has been gradually developed. The users live their lives with more convenience due to the expansions and developments of smart phones. However, the threatening on the security of the smart home network had occurred by various attacks with the connection to the smart environment telecommunication, lack of applications on low powered and light weight telecommunication, and the problems of security guideline. In addition, the solutions are required for the new and variant attacking cases such as data forgery and alteration of the device for disguising approach with ill will. In this article, the safe communication protocol was designed using certification management technique based on AKI which supplemented the weakness of PKI, the existing certification system in the smart environment. Utilizing the signature technique based on ECDSA, the efficiency on the communication performance was improved, and the security and the safety were analyzed on the security threat under the smart home environment.

A Study on Apparatus of Smart Wearable for Mine Detection (스마트 웨어러블 지뢰탐지 장치 연구)

  • Kim, Chi-Wook;Koo, Kyong-Wan;Cha, Jae-Sang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.263-267
    • /
    • 2015
  • current mine detector can't division the section if it is conducted and it needs too much labor force and time. in addition to, if the user don't move the head of sensor in regular speed or move it too fast, it is hard to detect a mine exactly. according to this, to improve the problem using one direction ultrasonic wave sensing signal, that is made up of human body antenna part, main micro processor unit part, smart glasses part, body equipped LCD monitor part, wireless data transmit part, belt type power supply part, black box type camera, Security Communication headset. the user can equip this at head, body, arm, waist and leg in removable type. so it is able to detect the powder in a 360-degree on(under) the ground whether it is metal or nonmetal and it can express the 2D or 3D film about distance, form and material of the mine. so the battle combats can avoid the mine and move fast. also, through the portable battery and twin self power supply system of the power supply part, combat troops can fight without extra recharge and we can monitoring the battle situation of distant place at the command center server on real-time. and then, it makes able to sharing the information of battle among battle combats one on one. as a result, the purpose of this study is researching a smart wearable mine detector which can establish a smart battle system as if the commander is in the site of the battle.

A Study on Business Types of IoT-based Smarthome: Based on the Theory of Platform Typology (IoT 기반 스마트홈 비즈니스 유형 연구: 플랫폼유형론을 근간으로)

  • Song, Minzheong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.27-40
    • /
    • 2016
  • This paper aims to analyze the business types of 237 IoT based smart home companies in the world (launched during 1999~2014) which got global investment last few years. For this, the previous literatures trying to analze technology and service types of smart home are searched and the typology of the platform is discussed. Based on it, this research conceptualizes an analysis framework that includes three areas of smart home like home automation, home security, and energy efficiency with the three platform types like product, software, and service. This study concludes that the development of business type for IoT based smart home ecosystem is from the product to software and it can be a platform or not. In current status, there are a few platforms of product and software, but in the device management (16%) and thermostat (11%), companies are persuing more platform like. It is difficult to find the service platform in overall areas, for application based service has a few attractions in the investment market due to the lack of cloud infrastructure and data analytics. The following three are the implication to domestic market: 1) More active offering of API and SDK, 2) more active introduction of wireless Intenet network protocols, and 3) more active interoperability efforts and alliance activities are needed.

A RSS-Based Localization for Multiple Modes using Bayesian Compressive Sensing with Path-Loss Estimation (전력 손실 지수 추정 기법과 베이지안 압축 센싱을 이용하는 수신신호 세기 기반의 위치 추정 기법)

  • Ahn, Tae-Joon;Koo, In-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.29-36
    • /
    • 2012
  • In Wireless Sensor Network(WSN)s, the detection of precise location of each node is essential for utilizing sensing data acquired from sensor nodes effectively. Among various location methods, the received signal strength(RSS) based localization scheme is mostly preferable in many applications because it can be easily implemented without any additional hardware cost. Since a RSS-based localization scheme is mainly affected by radio channel or obstacles such as building and mountain between two nodes, the localization error can be inevitable. To enhance the accuracy of localization in RSS-based localization scheme, a number of RSS measurements are needed, which results in the energy consumption. In this paper, a RSS based localization using Bayesian Compressive Sensing(BSS) with path-loss exponent estimation is proposed to improve the accuracy of localization in the energy-efficient way. In the propose scheme, we can increase the adaptative, reliability and accuracy of localization by estimating the path-loss exponents between nodes, and further we can enhance the energy efficiency by the compressive sensing. Through the simulation, it is shown that the proposed scheme can enhance the location accuracy of multiple unknown nodes with fewer RSS measurements and is robust against the channel variation.

Efficiency and Productivity on ICT Industry (ICT 제조업과 서비스업의 효율성과 생산성)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.16 no.4
    • /
    • pp.55-75
    • /
    • 2014
  • Non-parametric method such as technology efficiency, DEA/Window model and Malmquist Productivity Index (MPI) are used to measure efficiency and productivity of ICT (Information and Communication Technology) manufacturing industry and service industry over the period 2007-2011. The results of this paper indicate following: (1) Technology efficiency of the ICT manufacturing industry were found as the range of 0.34 and 0.39 over the sample period. Technology efficiency of the ICT service industry were found as the range of 0.16 and 0.20 over the sample period. (2) The geometric average of the Malmquist TFP indexes on ICT manufacturing industry indicated the productivity improvement an average of 8.3 percent. The geometric average of the Malmquist TFP indexes on ICT service industry indicated the productivity improvement an average of 1.6 percent. (3) TIER analysis result on ICT manufacturing industry showed that optimal bench marking made by storage devices${\rightarrow}$wireless communication equipment${\rightarrow}$broadcasting equipment${\rightarrow}$radio, recording and playback devices${\rightarrow}$computers, printers, video and audio-visual equipment path. TIER analysis result on ICT service industry indicated that optimal bench marking made by computers and packaged software${\rightarrow}$wired communication${\rightarrow}$communication, information, detection equipment${\rightarrow}$consulting and construction for computer systems integration${\rightarrow}$industrial machinery and equipment rental${\rightarrow}$telecommunications reseller${\rightarrow}$system software development and delivery${\rightarrow}$hosting path.

  • PDF

PAPR Reduction and BER Analysis of the OFDM System Using the TR and DCT Transform (톤 예약 기법과 DCT 변환을 이용한 OFDM 시스템의 PAPR 저감과 BER 분석)

  • Byeon, Heui-Seop;Shinn, Byung-Cheol;Ahn, Do-Seob
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.10 s.113
    • /
    • pp.976-984
    • /
    • 2006
  • OFDM system is very useful for the high speed communication system. However, OFDM system has a serious problem of high PAPR that results from the so many subcarriers in the same phase. This OFDM signal is distorted through the nonlinear HPA(High Power Amplifier). Tone reservation method is to insert tone signal in several types to reduce the PAPR after iterating this process by changing the tone signal. Also discrete cosine transform(DCT) can reduces the PAPR as multiplying the cosine value to change the angle and mix up with the data. In the paper, the combination of the TR method and DCT method is newly proposed for more effective reduction of the PAPR. Simulation results show that the proposed method outperforms the conventional simple TR method and DCT method with respect to the PAPR reduction and BER performance.

An Efficient Broadcast Technique for Vehicular Networks

  • Ho, Ai Hua;Ho, Yao H.;Hua, Kien A.;Villafane, Roy;Chao, Han-Chieh
    • Journal of Information Processing Systems
    • /
    • v.7 no.2
    • /
    • pp.221-240
    • /
    • 2011
  • Vehicular networks are a promising application of mobile ad hoc networks. In this paper, we introduce an efficient broadcast technique, called CB-S (Cell Broadcast for Streets), for vehicular networks with occlusions such as skyscrapers. In this environment, the road network is fragmented into cells such that nodes in a cell can communicate with any node within a two cell distance. Each mobile node is equipped with a GPS (Global Positioning System) unit and a map of the cells. The cell map has information about the cells including their identifier and the coordinates of the upper-right and lower-left corner of each cell. CB-S has the following desirable property. Broadcast of a message is performed by rebroadcasting the message from every other cell in the terrain. This characteristic allows CB-S to achieve an efficient performance. Our simulation results indicate that messages always reach all nodes in the wireless network. This perfect coverage is achieved with minimal overhead. That is, CB-S uses a low number of nodes to disseminate the data packets as quickly as probabilistically possible. This efficiency gives it the advantage of low delay. To show these benefits, we give simulations results to compare CB-S with four other broadcast techniques. In practice, CB-S can be used for information dissemination, or to reduce the high cost of destination discovery in routing protocols. By also specify the radius of affected zone, CB-S is also more efficient when broadcast to a subset of the nodes is desirable.

User Authentication Mechanism for using a Secure IPTV Service in Mobile Device (이동 장비에서 안전한 IPTV 서비스를 사용하기 위한 사용자 인증 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.377-386
    • /
    • 2009
  • IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.