• Title/Summary/Keyword: Wireless Internet Device

Search Result 335, Processing Time 0.022 seconds

A study on Folded Monopole Antenna for Wireless HDMI Dongle Applications (무선 HDMI 동글장치를 위한 폴디드 모노폴 안테나에 관한 연구)

  • Lee, Yun-Min;Lee, Jae-Choon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.211-215
    • /
    • 2015
  • In this paper, we propose a internal antenna for wirless HDMI dongle device using the folded monopole structure. The proposed antenna is for 2.4GHz and 5.8GHz. The antenna optimized for parameters length, gap, width, and radius of semicircular of monopole antenna using the 'F' structure. To confirm the characteristics of the antenna parameters, HFSS from ANSYS Inc. was used for the analysis. We used an FR4 dielectric substrate with a dielectric constant of 4.4. The HDMI dongle size of the proposed antenna is $45{\times}20{\times}1mm$, and the size of the antenna area is $5{\times}20mm$. There is a value of return loss less then -10dB in 2.4GHz and 5.8GHz, band and the maximum antenna gain is -4.13dBi. The result proved the possibility of the practical using 'F' structure that came frin comparing and analyzing the measured and simulated data of the antenna.

Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment (M2M 통신 환경에서 트랩도어 충돌 해쉬를 이용한 그룹키 생성 및 교환 기법)

  • Kim, Sung-Soo;Jun, Moon-Seog;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.9-17
    • /
    • 2015
  • The development of wireless communication technology and change in the ICT market has led to the development of the M2M service and technology. Under these circumstances, the M2M environment has been the focus of communication environment construction between machines without control or direct intervention of human being. With characteristics of wireless communication environment, the possibility of being exposed to numerous security threats and safe communication security technology have becoming an issue an important requirements for problems such as data exposure, forgery, modulation, deletion, and privacy. This research analyzes requirements of trapdoor collision hash, generates keys between groups under the M2M environment by using the specificity of trapdoor, and suggests technology to exchange keys with session keys. Further, it also suggests techniques to confirm authentication of device and gateway in accordance with group key generation. The techniques herein suggested are confirmed as safe methods in that they have attack resistance such as Masquerade Attack, Man-in-the-Middle Attack, and Replay Attack in the group communication block by using the speciality of collision message and collision hash.

Improvement Research of BLE-based System for Monitoring the cause of Breakdown of Automatic Doors (자동문의 고장원인을 모니터링하기 위한 BLE 기반의 시스템 개선연구)

  • Kim, Gi-Doo;Won, Seo-Yeon;Kim, Hie-Sik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.7
    • /
    • pp.93-102
    • /
    • 2017
  • Recently increasing usage of smartphones makes the Internet of Things (IoT) a leading technology that can collect and share data through sensor networks and wireless communication such as low-power Bluetooth (BLE). BLE-based application can provide operators more precise information on Automatic Door system by remotely diagnosing the system faults through wireless sensor networks and sensors around the Automatic Door. In this paper, a smart device with extended BLE module is implemented which can monitor and Control the system states and faults remotely without on-site diagnostic. while maintaining system integrity so that increase efficiency of time and costs for system management. We can use the results of this research as a basis in evaluating reliability of data between devices, extending communication module in Controller of obsolete Door systems, and establishing centralized monitoring systems in near future with multi-channel Door Controls.

A Web Services Delivery System for Mobile Environment (모바일 환경을 위한 웹 서비스 전송 시스템)

  • Kim, Jin-Il;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.203-210
    • /
    • 2008
  • Recently, as wireless communication are becoming more and more popular, Internet users is becoming increasingly demand HTTP-based web service in mobile computing environment. But, overall performance of web services may slow down, because mobile device are generally equipped with lower capability. Therefore, the most important factor to design wireless internet delivery system should be scalable to handle a large scale traffic due to rapidly growing users. But, in case of some preceding research, they not present a basic efficiency reform measure until currently. Therefore, In this paper, We propose a Web Service Delivery System for mobile environment that alleviates problems that occurred while executing web services in mobile environment and are helpful to overcome the above needs. The system composed of HTML/WML Converter, SOAP message processor. We compare the existing system with the proposed system.

  • PDF

Design and Implementation of Tiny TCP/IPv6 Protocol for Wireless Sensor Networks (센서 네트워크를 위한 초경량 TCP/IPv6 프로토콜의 설계 및 구현)

  • Kim, Shin-Jae;Kim, Young-Gyun;Lee, Wan-Jik;Heo, Seok-Yeol;Shin, Bum-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1955-1961
    • /
    • 2009
  • As a core technology realizing ubiquitous world, recent researches are being concentrated to wireless sensor network. However, most research results were focused to the sensor network technology itself, even though interworking between the sensor network and Internet is also one of primitive requirements for ubiquitous world. In this paper, we design the tiny TCP/IPv6 profile which makes it possible to inter-connect the sensor network device to IPv6 based Internet. To confirm operation of the designed profile, we experimentally implemented and evaluated minimum TCP/IPv6 based on TinyOS. The evaluation result shows that throughput of our tiny TCP/IPv6 is almost same as that of TinyOS component.

A Study on Function Definition of U-learning Support System in Smart Phone Environment (스마트폰 환경에서의 유러닝 지원시스템의 기능 정의 및 활용 방안 연구)

  • Jun, Woo-Chun
    • 한국정보교육학회:학술대회논문집
    • /
    • 2011.01a
    • /
    • pp.271-279
    • /
    • 2011
  • With advanced technologies of information and communication technologies, ubiquitous computing becomes popular. U-learning(Ubiquitous Learning) is a new paradigm that was started with ubiquitous computing environment. U-learning has characteristics such as anytime, anywhere, any network and any device, The U-learning support system(ULSS) is the system for supporting the u-Learning. Also, with recent fashion of smart phones, their use in education becomes interested. In this paper, The ULSS is defined in smart phone environments.

  • PDF

Development of Motocycle's Anti-theft Device Based on NFC (NFC기반의 보안인증을 통한 이륜차 도난방지장치 구현)

  • Jin, Taeseok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.165-170
    • /
    • 2016
  • Recently, IoT(Internet of Things) technology is widely applied in not only our everyday lives but also in industry, medical field and security system. NFC system, the basis of IoT, is in the spotlight which can be an alternative solution of a anti-theft system for motorcycle as they basically have practicality and security issues. Anti-theft system for motorcycle using the NFC smart devices based on RFID has been proposed. because Progress of Smart Device If someone get the Key for motorcycle theft, he can be easily stolen motorcycle. We thought about the concept of NFC security devices as a wireless key and automatic solenoid valve for setting the lock and unlock module. In this study, we designed motorcycle smart key system with general-purpose NFC system and the automatic solenoid valve for setting the lock and unlock module. First, we designed control unit and NFC card reader for motorcycle smart key system. Then we propose an AES encryption algorithm and prove that the motorcycle key system is controllable by showing the result of implementing and testing, after installing.

Gesture based Natural User Interface for e-Training

  • Lim, C.J.;Lee, Nam-Hee;Jeong, Yun-Guen;Heo, Seung-Il
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.4
    • /
    • pp.577-583
    • /
    • 2012
  • Objective: This paper describes the process and results related to the development of gesture recognition-based natural user interface(NUI) for vehicle maintenance e-Training system. Background: E-Training refers to education training that acquires and improves the necessary capabilities to perform tasks by using information and communication technology(simulation, 3D virtual reality, and augmented reality), device(PC, tablet, smartphone, and HMD), and environment(wired/wireless internet and cloud computing). Method: Palm movement from depth camera is used as a pointing device, where finger movement is extracted by using OpenCV library as a selection protocol. Results: The proposed NUI allows trainees to control objects, such as cars and engines, on a large screen through gesture recognition. In addition, it includes the learning environment to understand the procedure of either assemble or disassemble certain parts. Conclusion: Future works are related to the implementation of gesture recognition technology for a multiple number of trainees. Application: The results of this interface can be applied not only in e-Training system, but also in other systems, such as digital signage, tangible game, controlling 3D contents, etc.

Intelligent News Recommendation System Design and Evaluation under Wireless Internet Enviornment (무선인터넷 환경하의 지능형 뉴스 추천 시스템 설계와 유효성 검증)

  • Bok Jun-young;Choi Joon-yeon;Hwang Jong-sun
    • Annual Conference of KIPS
    • /
    • 2004.11a
    • /
    • pp.463-466
    • /
    • 2004
  • 최근 Device 의 대중화로 모바일 폰 사용자는 언제 어디서라도 정보서비스 및 멀티미디어 동영상 서비스를 쉽게 접할 수 있게 되었다. 하지만, 작은 화면과 불편한 User Interface 를 가진 모바일 Device 의 한계와 양적인 컨텐츠의 증가로 인하여 사용자가 원하는 정보를 Access 하기에는 너무 많은 시간과 비용이 소요되고 있다. 본 논문에서는 사용자의 Accessibility 욕구를 충족하고 시간과 비용을 절감하기 위한 방법으로서 무선 인터넷 환경에서의 추천 시스템을 기반으로 방대한 분량의 뉴스 컨텐츠 가운데 개인화 된 뉴스를 선별, 제공해 주는 지능형 추천 시스템을 설계 구현하고자 한다. 본 논문은 인공 지능 분야 중 에이전트의 추천 역할과 기능면에서 Collaborative Filtering 방법이 갖고 있는 계산 속도 문제에 대한 대안으로서, 유사한 선호도의 사용자를 특성에 따라 분류하기 위해 군집분석을 이용했으며, 각 군집별로 뉴스 카테고리를 Weighting 한 후, 뉴스 컨텐츠를 Scoring, Listing하여 사용자가 읽은 뉴스에 대한 평가를 기록하고 이틀 각 군집별로 반영하는 방법을 수행하였다. 추가로 뉴스 컨텐츠의 사용자 만족도를 평가하기 위하여 뉴스를 처음부터 끝까지 읽은 완독률을 측정기준으로 제시하고 일반적인 무선 인터넷 환경하의 뉴스 메뉴체계와 비교하여 설계된 시스템의 성능에 대한 유효성을 검증하였다.

  • PDF

A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks

  • Jeong, Yoon-Su;Kim, Yong-Tae;Shin, Seung-Soo;Lee, Sang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.923-948
    • /
    • 2013
  • The main concern in mobile peer-to-peer (P2P) networks is security because jamming or eavesdropping on a wireless link is much easier than on a wired one and such damage can be incurred without physical access or contact. In particular, authentication has increasingly become a requirement in mobile P2P environments. This paper presents a new mutual authentication mechanism which requires less storage space and maintains a high level of security in mobile P2P networks. The proposed mechanism improves efficiency by avoiding the use of centralized entities and is designed to be agile in terms of both reliability and low-cost implementation. The mechanism suggested in the simulation evaluates the function costs occurring in authentication between the devices under mobile P2P network environment comparing to existing method in terms of basic operation costs, traffic costs, communications costs, storage costs and scalability. The simulation results show that the proposed mechanism provides high authentication with low cryptography processing overhead.