• Title/Summary/Keyword: collision Avoidance

Search Result 832, Processing Time 0.035 seconds

Performance Analysis of Opportunistic Spectrum Access Protocol for Multi-Channel Cognitive Radio Networks

  • Kim, Kyung Jae;Kwak, Kyung Sup;Choi, Bong Dae
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.77-86
    • /
    • 2013
  • Cognitive radio (CR) has emerged as one of effective methods to enhance the utilization of existing radio spectrum. Main principle of CR is that secondary users (SUs) are allowed to use the spectrum unused by primary users (PUs) without interfering PU's transmissions. In this paper, PUs operate on a slot-by-slot basis and SUs try to exploit the slots unused by PUs. We propose OSA protocols in the single channel and we propose an opportunistic spectrum access (OSA) protocols in the multi-channel cognitive radio networks with one control channel and several licensed channels where a slot is divided into contention phase and transmission phase. A slot is divided into reporting phase, contention phase and transmission phase. The reporting phase plays a role of finding idle channels unused by PUs and the contention phase plays a role of selecting a SU who will send packets in the data transmission phase. One SU is selected by carrier sense multiple access / collision avoidance (CSMA/CA) with request to send / clear to send (RTS/CTS) mechanism on control channel and the SU is allowed to occupy all remaining part of all idle channels during the current slot. For mathematical analysis, first we deal with the single-channel case and we model the proposed OSA media access control (MAC) protocol by three-dimensional discrete time Markov chain (DTMC) whose one-step transition probability matrix has a special structure so as to apply the censored Markov chain method to obtain the steady state distribution.We obtain the throughput and the distribution of access delay. Next we deal with the multi-channel case and obtain the throughput and the distribution of access delay by using results of single-channel case. In numerical results, our mathematical analysis is verified by simulations and we give numerical results on throughput and access delay of the proposed MAC protocol. Finally, we find the maximum allowable number of SUs satisfying the requirements on throughput and access delay.

Design of a 24 GHz Power Amplifier Using 65-nm CMOS Technology (65-nm CMOS 공정을 이용한 24 GHz 전력증폭기 설계)

  • Seo, Dong-In;Kim, Jun-Seong;Cui, Chenglin;Kim, Byung-Sung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.10
    • /
    • pp.941-944
    • /
    • 2016
  • This paper proposes 24 GHz power amplifier for automotive collision avoidance and surveillance short range radar using Samsung 65-nm CMOS process. The proposed circuit has a 2-stage differential power amplifier which includes common source structure and transformer for single to differential conversion, impedance matching, and power combining. The measurement results show 15.5 dB maximum voltage gain and 3.6 GHz 3 dB bandwidth. The measured maximum output power is 13.1 dBm, input $P1_{dB}$ is -4.72 dBm, output $P1_{dB}$ is 9.78 dBm, and maximum power efficiency is 17.7 %. The power amplifier consumes 74 mW DC power from 1.2 V supply voltage.

A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry (국내외 드론산업 동향 분석을 통한 공공분야에서의 드론 활용방안에 대한 연구)

  • Sim, Seungbae;Kwon, Hunyeong;Jung, Hosang
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.25-39
    • /
    • 2016
  • The drone is an unmanned aerial vehicle which has no human pilot. Drones can be classified into military drones, commercial drones, and personal drones by usage. Also, drones can be classified from large-sized to nano-sized drone by size and autonomous, remote controlled drone by control type. Especially, military drones can be classified into low-altitude drones, medium-altitude, and high-altitude drones by altitude. Recently, the drone industry is one of the fast growing industries in the world. As drone technologies have become more advanced and cost-effective, Korean government has set its goal to become a top-level country in drone business. However, the government's strict regulation for drone operations is one of the biggest hurdles for the development of the related technologies in Korea and other countries. For example, critical problems for drone delivery can be classified into technical issues and institutional issues. Technical issues include durability, conditional awareness, grasp and release mechanisms, collision avoidance systems, drone operating system. Institutional issues include pilot and operator licensing, privacy rules, noise guidelines, security rules, education for drone police. This study analyzes the trends of the drone industry from the viewpoint of technology and regulation. Also, we define the business areas of drone utilization. Especially, the drone business types or models for public sector are proposed. Drone services or functions promoting public interests need to be aligned with the business reference model of Korean government. To define ten types of drone uses for public sector, we combine the business types of government with the future uses of drones that are proposed by futurists and business analysts. Future uses of drones can be divided into three sectors or services. First, drone services for public or military sectors include early warning systems, emergency services, news reporting, police drones, library drones, healthcare drones, travel drones. Second, drone services for commercial or industrial services include parcel delivery drones, gaming drones, sporting drones, farming and agriculture drones, ranching drones, robotic arm drones. Third, drone services for household sector include smart home drones.

Development of EM Wave Absorber for Millimeter Wave Radar (밀리미터 레이더용 전파흡수체 개발)

  • Choi Chang-Mook;Kim Dong-Il;Je Seung-Hun;Choi Yun-Seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.223-227
    • /
    • 2006
  • The millimeter-wave radar is positioned as a key, basic ITS technology supporting safe driving, because millimeter wave allows radar to see small distant objects. This system is considered the collision-avoidance radar available in some cars. This system employs poised radar operating within the frequency range $76\sim77GHz$. Radar systems create two major problems(false images and system-to-system interference). False echoes cause driving hazards. These problems can be eliminated through the use of EM wave absorber. Therefore, we designed and fabricated EM wave absorber using permalloy. It has the thickness of 1.4 mm with composition of permalloy:CPE=70:30 wt% and absorption ability higher than 18 dB in the frequency range $76\sim77GHz$.

  • PDF

Safety Distance Visualization Tool for LTE-Based UAV Positioning in Urban Areas (도심 지역 LTE 측위 기반 무인항공기 안전거리 생성 알고리즘 연구 및 시각화 도구 개발)

  • Lee, Halim;Kang, Taewon;Seo, Jiwon
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.408-414
    • /
    • 2019
  • We developed a surveillance tool for collision avoidance of unmanned aerial vehicles (UAVs) in urban areas. In our tool, users can visualize the safety distance on the actual 3D map of urban area. The estimated positions of UAVs are assumed to be obtained based on the long-term evolution (LTE) signals. The safety distance is defined to include two or more signals with bias. The safety distance calculation method used in this paper enables simulation similar to the actual urban areas where signals are frequently biased due to multipath. In the simulation, the parameters were set based on the measured values, and the change of the safety distance according to the number of faulty signals was simulated. As a result, increasing the number of faulty signals led to a longer safety distance as expected.

A Study on Marine Application of Wireless Access in Vehicular Environment (WAVE) Communication Technology (차량용 무선통신기술(WAVE)의 해상적용에 관한 연구)

  • Kang, Won-Sik;Jeon, Soon-Bae;Kim, Young-Du
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.4
    • /
    • pp.445-450
    • /
    • 2018
  • AIS is the most important navigation equipment for the identification of other ships, etc. However, the AIS overload problem has been raised recently due to an increase in AIS equipped vessels. The government is planning to introduce the wireless LTE network at 100 km offshore as part of the SMART-Navigation project. Continuous development and dissemination of the services available through such platforms will be necessary to achieve major goals such as marine accident prevention and environmental protection. In this study, we applied a WAVE communication system, which could be the basis for the development of such services. As a result, reliable data transmission was confirmed for a range of communication of approx. 5 miles, although the service was limited to 1 km in road traffic. Therefore, it is expected that WAVE communication technology will be used to prevent marine accidents through such efforts as collision avoidance and the transfer of marine safety information between ships.

A Channel Allocation Protocol for Collision Avoidance between Reader in 2.4GHz Multiple Channel Active RFID System (2.4GHz 다중채널 능동형RFID시스템에서 리더간 충돌회피를 위한 채널 할당 프로토콜)

  • Kim, Dong-Hyun;Lee, Chae-Suk;Kim, Jong-deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.139-142
    • /
    • 2009
  • RFID(Radio Frequency IDentification) technology is an automatic identification method using radio frequencies between RFID reader which collects the information and tag which transmits the information. RFID technology develops passive RFID which transmit the only ID to active RFID which transmit the additional information such as sensing information. However, ISO/IEC 18000-7 as active RFID standard has a problem which cannot use multiple channel. To solve this problem, we use the 2.4GHz bandwidth technology and we propose the dynamic channel allocation method which can efficiently allot a channel. we show the operation of the dynamic channel allocation method through design and implement with CC2500DK of Taxas Instrument.

  • PDF

A Study of Automatic Recognition on Target and Flame Based Gradient Vector Field Using Infrared Image (적외선 영상을 이용한 Gradient Vector Field 기반의 표적 및 화염 자동인식 연구)

  • Kim, Chun-Ho;Lee, Ju-Young
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.1
    • /
    • pp.63-73
    • /
    • 2021
  • This paper presents a algorithm for automatic target recognition robust to the influence of the flame in order to track the target by EOTS(Electro-Optical Targeting System) equipped on UAV(Unmanned Aerial Vehicle) when there is aerial target or marine target with flame at the same time. The proposed method converts infrared images of targets and flames into a gradient vector field, and applies each gradient magnitude to a polynomial curve fitting technique to extract polynomial coefficients, and learns them in a shallow neural network model to automatically recognize targets and flames. The performance of the proposed technique was confirmed by utilizing the various infrared image database of the target and flame. Using this algorithm, it can be applied to areas where collision avoidance, forest fire detection, automatic detection and recognition of targets in the air and sea during automatic flight of unmanned aircraft.

Self Generable Conditionally Anonymous Authentication System for VANET (VANET를 위한 차량자체생성 조건부익명 인증시스템)

  • Kim, Sang-Jin;Lim, Ji-Hwan;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.105-114
    • /
    • 2009
  • Messages exchanged among vehicles must be authenticated in order to provide collision avoidance and cooperative driving services in VANET. However, digitally signing the messages can violate the privacy of users. Therefore, we require authentication systems that can provide conditional anonymity. Recently, Zhang et al. proposed conditionally anonymous authentication system for VANET using tamper-resistant hardware. In their system, vehicles can generate identity-based public keys by themselves and use them to sign messages. Moreover, they use batch verification to effectively verify signed messages. In this paper, we provide amelioration to Zhang et al.'s system in the following respects. First, we use a more efficient probabilistic signature scheme. Second, unlike Zhang et al., we use a security proven batch verification scheme. We also provide effective solutions for key revocation and anonymity revocation problems.

Collision Avoidance Path Control of Multi-AGV Using Multi-Agent Reinforcement Learning (다중 에이전트 강화학습을 이용한 다중 AGV의 충돌 회피 경로 제어)

  • Choi, Ho-Bin;Kim, Ju-Bong;Han, Youn-Hee;Oh, Se-Won;Kim, Kwi-Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.281-288
    • /
    • 2022
  • AGVs are often used in industrial applications to transport heavy materials around a large industrial building, such as factories or warehouses. In particular, in fulfillment centers their usefulness is maximized for automation. To increase productivity in warehouses such as fulfillment centers, sophisticated path planning of AGVs is required. We propose a scheme that can be applied to QMIX, a popular cooperative MARL algorithm. The performance was measured with three metrics in several fulfillment center layouts, and the results are presented through comparison with the performance of the existing QMIX. Additionally, we visualize the transport paths of trained AGVs for a visible analysis of the behavior patterns of the AGVs as heat maps.