• Title/Summary/Keyword: Wireless communication technology

Search Result 2,523, Processing Time 0.03 seconds

Design and implement of patch type wireless skin temperature measuring system (패치형 무선 피부 온도 측정 시스템의 설계 및 구현)

  • Woo, S.H.;Park, S.Y.;Din, Z. Mohy Ud;Won, C.H.;Lee, J.H.;Park, H.J.;Lee, J.W.;Hong, Y.G.;Suh, J.H.;Youm, Y.G.;Cho, J.H.
    • Journal of Sensor Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.350-360
    • /
    • 2008
  • In every large hospital, nurses must perform simple repetitive tasks such as measuring body temperature. Such tedious work reduces nurses' motivation to provide quality medical care, which is an important element of the medical services provided by a hospital. If a device were available to measure body temperature, nurses could focus on the more important aspects of providing quality medical care to the patients. However, body temperature is generally measured from the throat, anus, tympanum or armpit, where it is difficult to affix a patch type device. In addition, general body temperature measuring points shows moving artifact error; therefore, it is not good point to continually measure the temperature. In this paper, a patch type skin temperature measuring system was developed. To appropriately measure the skin temperature, a thermal transducer was implemented with a thin (0.5 mm) temperature sensor. The system is small and thin ($H6.6{\sim}5.3{\times}L35{\times}W24\;mm$), and weighs only 5 g including a battery, case and circuit; therefore, it is small and light enough to function as a patch type device. Moreover, the system worked for 5 days. To investigate differences between the experimental and conventional thermometer, simple clinical experiments were performed with 17 volunteers, and the result showed some correlation between the implemented system and conventional thermometer (Correlation coefficient = 0.647, P<0.1).

The Realization on GAS Sensor Module for Inteligent Wireless Communication (지능형 무선통신용 가스 센서 모듈 구현)

  • Kim, Hyo-Chan;Weon, Young-Su;Cho, Hyung-Rae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.6
    • /
    • pp.123-132
    • /
    • 2012
  • Gas sensors has been used very differently that depending on following purposes; Automotive (exhaust gas, fuel mixture gas, oxygen, particulates), agriculture / food industry (fresh, stored, CO2, humidity, NH3, nitrogen oxide gas, organic gas, toxic gas emitted from pesticides and insecticides), industrial / medical (chemical gas, hydrogen, oxygen and toxic gases), military (chemical weapon), environmental measurements (CO and other air pollution consisting of sulfur and nitrogen gas), residential (LNG, LPG, butane, indoor air, humidity). The types of industrial toxic substances are known about 700 species and many of these exist in gaseous form under normal conditions. he multi-gas detection sensors will be developed for casualties that detect the most important and find easy three kinds of gases in marine plant; carbon dioxide(CO2), carbon(CO), ammonia(NH3). Package block consists of gas sensing device minor ingredient, rf front end, zigbee chip. Develope interworking technology between the sensor and zigbee chip inside a package. Conduct a performance test through test jig about prototype zigbee sensor module with rf output power and unwanted emission test. This research task available early address when poisonous gas leaked from large industrial site and contribution for workers' safety at the enclosed space.

A Resilient Key Renewal Scheme in Wireless Sensor Networks (센서 네트워크에서 복원력을 지닌 키갱신 방안)

  • Wang, Gi-Cheol;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.103-112
    • /
    • 2010
  • In sensor networks, because sensors are deployed in an unprotected environment, they are prone to be targets of compromise attack, If the number of compromised nodes increases considerably, the key management in the network is paralyzed. In particular, compromise of Cluster Heads (CHs) in clustered sensor networks is much more threatening than that of normalsensors. Recently, rekeying schemes which update the exposed keys using the keys unknown to the compromised nodes are emerging. However, they cause some security and efficiency problems such as single group key employment in a cluster, passive eviction of compromised nodes, and excessive communication and computation overhead. In this paper, we present a proactive rekeying scheme using renewals of duster organization for clustered sensor networks. In the proposed scheme, each sensor establishes individual keys with neighbors at network boot-up time, and these keys are employed for later transmissions between sensors and their CH. By the periodic cluster reorganization, the compromised nodes are expelled from network and the individual keys employed in a cluster are changed continuously. Besides, newly elected CHs securely agree a key with sink by informing their members to sink, without exchangingany keying materials. The simulation results shows that the proposed scheme remarkably improves the confidentiality and integrity of data in spite of the increase of compromised nodes. Also, they show that the proposed scheme exploits the precious energy resource more efficiently than SHELL.

Fabrication of Three-Dimensional Scanning System for Inspection of Mineshaft Using Multichannel Lidar (다중채널 Lidar를 이용한 수직갱도 조사용 3차원 형상화 장비 구현)

  • Soolo, Kim;Jong-Sung, Choi;Ho-Goon, Yoon;Sang-Wook, Kim
    • Tunnel and Underground Space
    • /
    • v.32 no.6
    • /
    • pp.451-463
    • /
    • 2022
  • Whenever a mineshaft accidentally collapses, speedy risk assessment is both required and crucial. But onsite safety diagnosis by humans is reportedly difficult considering the additional risk of collapse of the unstable mineshaft. Generally, drones equipped with high-speed lidar sensors can be used for such inspection. However, the drone technology is restrictively applicable at very shallow depth, failing in mineshafts with depths of hundreds of meters because of the limit of wireless communication and turbulence inside the mineshaft. In previous study, a three-dimensional (3D) scanning system with a single channel lidar was fabricated and operated using towed cable in a mineshaft to a depth of 200 m. The rotation and pendulum movement errors of the measuring unit were compensated for by applying the data of inertial measuring unit and comparing the similarity between the scan data of the adjacent depths (Kim et al., 2020). However, the errors grew with scan depth. In this paper, a multi-channel lidar sensor to obtain a continuous cross-sectional image of the mineshaft from a winch system pulled from bottom upward. In this new approach, within overlapped region viewed by the multi-channel lidar, rotation error was compensated for by comparing the similarity between the scan data at the same depth. The fabricated system was applied to scan 0-165 m depth of the mineshaft with 180 m depth. The reconstructed image was depicted in a 3D graph for interpretation.

Replay Attack based Neutralization Method for DJI UAV Detection/Identification Systems (DJI UAV 탐지·식별 시스템 대상 재전송 공격 기반 무력화 방식)

  • Seungoh Seo;Yonggu Lee;Sehoon Lee;Seongyeol Oh;Junyoung Son
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.133-143
    • /
    • 2023
  • As drones (also known as UAV) become popular with advanced information and communication technology (ICT), they have been utilized for various fields (agriculture, architecture, and so on). However, malicious attackers with advanced drones may pose a threat to critical national infrastructures. Thus, anti-drone systems have been developed to respond to drone threats. In particular, remote identification data (R-ID)-based UAV detection and identification systems that detect and identify illegal drones with R-ID broadcasted by drones have been developed, and are widely employed worldwide. However, this R-ID-based UAV detection/identification system is vulnerable to security due to wireless broadcast characteristics. In this paper, we analyze the security vulnerabilities of DJI Aeroscope, a representative example of the R-ID-based UAV detection and identification system, and propose a replay-attack-based neutralization method using the analyzed vulnerabilities. To validate the proposed method, it is implemented as a software program, and verified against four types of attacks in real test environments. The results demonstrate that the proposed neutralization method is an effective neutralization method for R-ID-based UAV detection and identification systems.

Implementation of Acceleration Sensor-based Human activity and Fall Classification Algorithm (가속도 센서기반의 인체활동 및 낙상 분류를 위한 알고리즘 구현)

  • Hyun Park;Jun-Mo Park;Yeon-Chul, Ha
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.2
    • /
    • pp.76-83
    • /
    • 2022
  • With the recent development of IT technology, research and interest in various biosignal measuring devices is increasing. As an aging society is in full swing, research on the elderly population using IT-related technologies is continuously developing. This study is about the development of life pattern detection and fall detection algorithm, which is one of the medical service areas for the elderly, who are rapidly developing as they enter a super-aged society. This study consisted of a system using a 3-axis accelerometer and an electrocardiogram sensor, collected data, and then analyzed the data. It was confirmed that behavioral patterns could be classified from the actual research results. In order to evaluate the usefulness of the human activity monitoring system implemented in this study, experiments were performed under various conditions, such as changes in posture and walking speed, and signal magnitude range and signal vector magnitude parameters reflecting the acceleration of gravity of the human body and the degree of human activity. was extracted. And the possibility of discrimination according to the condition of the subject was examined by these parameter values.

Study on Advisory Safety Speed Model Using Real-time Vehicular Data (실시간 차량정보를 이용한 안전권고속도 산정방안에 관한 연구)

  • Jang, JeongAh;Kim, HyunSuk
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.5D
    • /
    • pp.443-451
    • /
    • 2010
  • This paper proposes the methodology about advisory safety speed based on real-time vehicular data collected from highway. The proposed model is useful information to drivers by appling seamless wireless communication and being collected from ECU(Engine Control Unit) equipment in every vehicle. Furthermore, this model also permits the use of realtime sensing data like as adverse weather and road-surface data. Here, the advisory safety speed is defined "the safety speed for drivers considering the time-dependent traffic condition and road-surface state parameter at uniform section", and the advisory safety speed model is developed by considering the parameters: inter-vehicles safe stopping distance, statistical vehicle speed, and real-time road-surface data. This model is evaluated by using the simulation technique for exploring the relationships between advisory safety speed and the dependent parameters like as traffic parameters(smooth condition and traffic jam), incident parameters(no-accident and accident) and road-surface parameters(dry, wet, snow). A simulation's results based on 12 scenarios show significant relationships and trends between 3 parameters and advisory safety speed. This model suggests that the advisory safety speed has more higher than average travel speed and is changeable by changing real-time incident states and road-surface states. The purpose of the research is to prove the new safety related services which are applicable in SMART Highway as traffic and IT convergence technology.

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.

Evaluation of the Curvature Reliability of Polymer Flexible Meta Electronic Devices based on Variations of the Electrical Properties (전기적 특성 변화를 통한 고분자 유연메타 전자소자의 곡률 안정성 평가)

  • Kwak, Ji-Youn;Jeong, Ji-Young;Ju, Jeong-A;Kwon, Ye-Pil;Kim, Si-Hoon;Choi, Doo-Sun;Je, Tae-Jin;Han, Jun Sae;Jeon, Eun-chae
    • Applied Chemistry for Engineering
    • /
    • v.32 no.3
    • /
    • pp.268-276
    • /
    • 2021
  • As wireless communication devices become more common, interests in how to control the electromagnetic waves generated from the devices are increasing. One of the most commonly used electromagnetic wave control materials is magnetic one, but due to the features that make the product heavy and thick when applied to the product, it is difficult to use them in curved electronic devices. Therefore, a polymer flexible meta electronic device has been presented to sort out the problem, which is thin and can have various curvatures. However, it requires an additional evaluation of curvature reliability. In this study, we developed a method to predict electromagnetic wave control characteristics through the resistance/length of the conductive ink line patterns of polymer flexible meta electronic devices, which is inversely proportional to the electromagnetic wave control characteristics. As the radius of curvature decreased, the resistance/length increased, and there was little variations with the duration times of curvature. We also found that both permanent and recoverable changes along with the removal of curvature were occurred when the curvature was applied, and that the cause of these changes was newly created vertical cracks in the conductive ink line pattern due to the tensile stress applied by applying curvature.

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.