• Title/Summary/Keyword: Wireless Distribution System

Search Result 286, Processing Time 0.032 seconds

Advanced Big Data Analysis, Artificial Intelligence & Communication Systems

  • Jeong, Young-Sik;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.1-6
    • /
    • 2019
  • Recently, big data and artificial intelligence (AI) based on communication systems have become one of the hottest issues in the technology sector, and methods of analyzing big data using AI approaches are now considered essential. This paper presents diverse paradigms to subjects which deal with diverse research areas, such as image segmentation, fingerprint matching, human tracking techniques, malware distribution networks, methods of intrusion detection, digital image watermarking, wireless sensor networks, probabilistic neural networks, query processing of encrypted data, the semantic web, decision-making, software engineering, and so on.

Implementation of Automatic Gate System under AVI/AEI (화물차량 및 화물 인식 중 자동 게이트 시스템의 구현)

  • Hong, S.B.;Hong, G.Y.;Lim, W.Y.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.12 no.2
    • /
    • pp.43-58
    • /
    • 2004
  • Up-to-date cargo transport system, CVO(Commercial Vehicle Operations) is the system to manage efficiently cargo distribution as providing at real time the information of cargo location and situation through ITS and GPS technology. In this paper, we proposed the Gate Automation System of harbors among AEI/AVI. To implement his system, we use the DSRC/RFID(Dedicated Short Range Communication / Radio Frequency IDentification) which adopts an wireless communication between RSE(Road-side Equipment) and OBE(on-Board Equipment) on a vehicle. When constructing the Gate automation system of harbors, the business application ability are reviewed practically and the logistics facilities to be constructed in the near future may use this project results according to the international standard and it could help complete integrated logistics system.

  • PDF

Investigation of Secure Wireless Multihop Ad hoc Network (안전한 무선 Multihop Ad hoc 네트워크를 위한 연구)

  • Lee, Sang-Duck;Park, Jong-An;Han, Seung-Jo;Pyun, Jae-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.118-126
    • /
    • 2007
  • An ad hoc network is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies allowing people and devices to internetwork without any preexisting communication infrastructure. Although ad hoc network is attractive solution, there are still some major flaws that prevent commercial growth. Security is one of these main barriers; ad hoc networks are known to be particularly vulnerable to security attack. It is difficult to establish a centralized key distribution center and a trusted certification authority to provide cryptographic keys and digital certificates to nodes. To prevent attacks in ad hoc routing protocols, many algorithms have been used. In this paper, we have depicted a secure framework for multipath routing in wireless multihop network, which is comprehensive solution for secure data forwarding in wireless multihop networks. With the simulation results, the proposed scheme is compared with existing source routing scheme.

  • PDF

TCP Performance Analysis in Wireless Transmission using Adaptive Modulation and Coding Schemes (적응변조코딩 기법을 사용하는 무선 전송에서의 TCP 성능 분석)

  • 전화숙;최계원;정동근
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.188-195
    • /
    • 2004
  • We have analyzed the performance of TCP in the CDMA mobile communications systems with the adaptive modulation and coding(AMC). The wireless channel using AMC is characterized with not high error rate but highly varying bandwidth. Due to time-varying bandwidth, timeout events of TCP occurs more frequently, which leads to the throughput degradation. The analysis model is composed of the two parts. In the first part, we divide TCP packet stream into ‘packet groups’and derive the probability distribution of the wireless transmission time of each Packet group that reflects the time varying characteristics of AMC. In the second part, we formulate embedded Markov chain by making use of the results of the first part to model TCP timer mechanism and wireless transmission. Since our system model is characterized by the forward link high speed data transmission using AMC, the results reported in this paper can be used as a guideline for the design and operation of HSDPA, 1xEV-DO, and 1xEV-DV.

Security Authentication Technique using Hash Code in Wireless RFID Environments (무선 RFID 환경에서 해시코드를 이용한 EPC 코드 보안)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1077-1082
    • /
    • 2019
  • The development of computing technology and networking has developed into a fundamental technology of the Fourth Industrial Revolution, which provides a ubiquitous environment. In the ubiquitous environment, the IoT environment has become an issue so that various devices and the things can be actively accessed and connected. Also, the RFID system using the wireless identification code attaches an RFID tag to the object, such as the production and distribution of products. It is applied to the management very efficiently. EPCglobal is conducting a research on RFID system standardization and various security studies. Since RFID systems use wireless environment technology, there are more security threats than wire problems. In particular, failure to provide confidentiality, indistinguishability, and forward safety could expose them to various threats in the Fourth Industrial Revolution. Therefore, this study analyzes the standard method of EPCgolbal and proposes RFID security method using hash code that can consider the amount of computation.

Wireless LAN System based on IEEE 802.1x EAP-TLS Authentication Mechanism (IEEE 802.1x EAP-TLS 인증 메커니즘 기반 Wireless LAN 시스템)

  • Hong, Seong-Pyo;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1983-1989
    • /
    • 2012
  • The IEEE 802.1x standard provides an architectural framework which can be used various authentication methods. But, IEEE 802.1x also has vulnerabilities about the DoS(Denial of Service), the session hijacking and the MiM(Man in the Middle) attack due to caused by structural of authentication protocol. In this paper, we propose a WLAN system which can offer safety communication by complement of IEEE 802.1x vulnerabilities. The WLAN system accomplishes mutual authentications between authentication servers, clients and the AP using PKI and prevents an illegal user from intervening in communication to disguise oneself as a client, the AP or authentication servers. Also, we guarantee the safety of the communication by the Dynamic WEP key distribution between clients and the AP.

An Authentication Protocol Design in RFID System for Mobility (유동성을 지닌 RFID 시스템을 위한 인증 프로토콜 설계)

  • Kim, Young-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2010
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag and Reader of mobile and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

Design of an RFID Authentication Protocol Using Token Key and Hash Function (토큰키와 해쉬함수를 이용한 RFID 인증 프로토콜 설계)

  • Na, Young-Nam;Han, Jae-Kyun
    • 전자공학회논문지 IE
    • /
    • v.48 no.2
    • /
    • pp.52-60
    • /
    • 2011
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag&Reader and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

Development of The Physical Pressure Monitoring System to Prevent Pressure Ulcers (욕창 방지를 위한 체압 모니터링 시스템 개발)

  • Lee, Ah-Ra;Jang, Kyung-Bae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.4
    • /
    • pp.209-214
    • /
    • 2011
  • This study suggests a Healthcare System for elderly and disabled who have mobility impairment and use a wheelchair for long time. Seating long time in a wheelchair without reducing pressure causes high risk of developing pressure sores. Pressure sores come with great deal of pain and often lead to develop complication. Not only it takes time and effort to treat pressure sores but also increases medical expenses. Therefore, we will develop a device to help to prevent pressure sores by measuring pressure distribution while seating in a wheelchair and wirelessly send information to user device to check pressure distribution in real time. The equipment to measure body pressure is composed of FSR sitting mat which is a sensor measuring part and an user terminal which is a monitoring part. The designed mat is matrix formed FSR sensor to measure pressure. The sensor send measured data to the controller which is connected to the end of the mat, and then the collected data are sent to an user terminal through a bluetooth. Developing a pressure monitoring system will help to prevent those who have mobility impairment to manage pressure sores and furthermore relieve their burden of medical expenses.

Low Loss Power Dividing Switch for Indoor Microwave Power Distribution (마이크로파 실내 배전용 저반사형 전력 분배 스위치)

  • Choi, Young-Kyu
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.1
    • /
    • pp.90-94
    • /
    • 2013
  • A low loss power dividing switch in a indoor microwave power distribution system is proposed and designed with a various power dividing ratio. Switching characteristics are analyzed by use of the S-parameter of the switch. Newly proposed switch showed a very low return loss less than -30dB at the operating frequency of 2.45GHz. Three kinds of the switch in which we take out individually 1/2, 1/3 and 1/4 of the input power were fabricated, and measured the delivered, transmitted, and return loss power ratio. Simulated results showed that the lower power ratio is, the better accurate operating performance shows. This switch can switch the input power from 4.5% to 58% with the variance of 5% output power. The experimental results are in good agreement with the simulation within the return loss of 1%.