• Title/Summary/Keyword: data transmission

Search Result 6,324, Processing Time 0.038 seconds

A Novel Transmission Scheme for Compressed Health Data Using ISO/IEEE11073-20601

  • Kim, Sang-Kon;Kim, Tae-Kon;Lee, Hyungkeun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5855-5877
    • /
    • 2017
  • In view of personal health and disease management based on cost effective healthcare services, there is a growing need for real-time monitoring services. The electrocardiogram (ECG) signal is one of the most important of health information and real-time monitoring of the ECG can provide an efficient way to cope with emergency situations, as well as assist in everyday health care. In this system, it is essential to continuously collect and transmit large amount of ECG data within a given time and provide maximum user convenience at the same time. When considering limited wireless capacity and unstable channel conditions, appropriate signal processing and transmission techniques such as compression are required. However, ISO/IEEE 11073 standards for interoperability between personal health devices cannot properly support compressed data transmission. Therefore, in the present study, the problems for handling compressed data are specified and new extended agent and manager are proposed to address the problems while maintaining compatibility with existing devices. Extended devices have two PM-stores enabling compression and a novel transmission scheme. A variety of compression techniques can be applied; in this paper, discrete cosine transformation (DCT) is used. And the priority of information after DCT compression enables new transmission techniques for performance improvement. The performance of the compressed signal and the original uncompressed signal transmitted over the noisy channel are compared in terms of percent root mean square difference (PRD) using our simulation results. Our transmission scheme shows a better performance and complies with 11073 standards.

DL-LEACH: Hierarchical Dual-Hop Routing Protocol for Wireless Sensor Network (DL-LEACH : 무선 센서 네트워크를 위한 계층형 멀티 홉 라우팅 프로토콜)

  • Lee, Chang-Hee;Lee, Jong-Yong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.139-145
    • /
    • 2015
  • This paper proposes to increase the node energy effienciecy, which rapidly drops during the transmission of LEACH (Low Energy Adaptive Clustering Hierachy), using the method of DL-LEACH (Dual-hop Layered LEACH). By introducing dual-hop method in the data transmission, the proposed single-hop method for short-range transmission and multi-hop transmission method between the cluster heads for remote transmission was introduce. By introducing a partial multi-hop method in the data transmission, a single-hop method for short range transmission method between the cluster heads for remote transmission was introduces. In the proposed DL-LEACH, the energy consumption of cluster head for remote transmission reduces and increases the energy efficiency of sensor node by reducing the transmission distance and simplifying the transmission routine for short-range transmission. As compared the general LEACH, it was adapted to a wider sensor field.

Performance Evaluation of Smoothing Algorithms Reflecting Network Traffic (네트워크 트래픽을 반영하는 스무딩 알고리즘의 성능평가)

  • Lee, Myoun-Jae;Park, Do-Soon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2326-2333
    • /
    • 2009
  • In the adaptable bandwidth allocation technique, a transmission plan for variable rate video data is made by smoothing algorithms such as CBA algorithm and the data is sent by the transmission plan considering network traffic. But the CBA algorithm, the MCBA algorithm, MVBA algorithm and the other smoothing algorithms produce a transmission plan where the size of the increasing interval of transmission rate is generally larger than the size of the decreasing interval. And the transmission rate in CBA algorithm, the MCBA algorithm, the MVBA algorithm is changed in overflow curve during the increasing interval of transmission rate. This may cause many frames to be discarded when available transmission rate is larger than transmission rate by the transmission plan. In this paper, the smoothing algorithm, where transmission rate is changed in the middle of underflow curve and overflow curve to decrease the number of discarded frames, but the transmission rate increases at the minimum, and the CBA algorithm, the MCBA algorithm, the MVBA algorithm are applied to a transmission plan in the adaptable bandwidth allocation technique, and the minimum frame rates, the average frame rates, the variation of frame rates, and the numbers of discarded frames are compared in among algorithms.

Development of Wireless Data Transmission System for LPWA-based Industrial Sites (LPWA 기반 산업현장의 무선 데이터 전송 시스템 개발)

  • Kwon, Hyuk;Cho, Kyoung-Woo;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.1
    • /
    • pp.37-42
    • /
    • 2018
  • Recently, there have been many studies on the IoT environment in which the sensors attached to the equipment automatically transmit and process the site information in real time through the network to control the equipment. The core of such a system is a network for data transmission and reception, and a wired network with wide transmission distance is a priority. However, in the case of a wired network, there is a problem that the time and cost consumed to configure the communication is higher than that of the wireless. In this paper, we propose LPWA - based wireless data transmission system using LPWA and BLE communication to solve this problem. The proposed system collects data from equipment through BLE and transmits data to the server using LPWA. Experimental results show that the spreading factor of maximum length of LPWA is 8, and the minimum length is 9.

The QoS support using DSR protocol In Mobile Ad-hoc Network (이동 애드혹 네트워크에서 DSR 프로토콜을 이용한 QoS 지원)

  • Park, Gyong-Bae;Kang, Kyoeng-In;Oh, Se-Duck
    • Journal of IKEEE
    • /
    • v.7 no.1 s.12
    • /
    • pp.63-71
    • /
    • 2003
  • In this paper, we propose an DSR(Dynamic Source Routing) protocol to support QoS for reliable data transmission in the mobile ad-hoc network. The proposed algorithm uses DSR protocol to support QoS as its basic routing protocol, and uses the nodes which are between source and destination nodes as key QoS support. Because of moving nodes there is some problem that is restricted reliable data transmission. For solve this problem, source node set up the QoS link with destination node. The nodes that are located at QoS link and find out loss of transmission path save the transmitting data packets. Those search a new transmission path to destination node and transmit the saved data packet to destination node. As the result of evaluation, we found the proposed QoS network guaranteed reliable data transmission with almost 100% data reception rate for slowly moving mobile ad-hoc network and with more 96% data reception rate, which is improvement of 3.7737% reception rate compared with none QoS network, for continuously fast moving mobile ad-hoc network.

  • PDF

A Mechanism for the Secure IV Transmission in IPSec (IPSec에서 안전한 IV 전송을 위한 메커니즘)

  • Lee, Young-Ji;Park, Nam-Sup;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.156-164
    • /
    • 2002
  • IPSec is a protocol which provides data encryption, message authentication and data integrity on public and open network transmission. In IPSec, ESP protocol is used when it needs to provide data encryption, authentication and Integrity In real transmission packets. ESP protocol uses DES-CBC encryption mode when sender encrypts packets and receiver decrypts data through this mode IV is used at that time. This value has many tasks of attack during transmission by attacker because it is transferred clean and opened. If IV value is modified, then decryption of ESP data is impossible and higher level information is changed. In this paper we propose a new algorithm that it encrypts IV values using DES-ECB mode for preventing IV attack and checks integrity of whole ESP data using message authentication function. Therefore, we will protect attacks of IV and data, and guarantee core safe transmission on the public network.

Data Transmission Performance Study of Wireless Channels over CCN-based VANETs (CCN 기반의 VANET에서 무선 채널에 따른 전송 성능에 관한 연구)

  • Kang, Seung-Seok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.367-373
    • /
    • 2022
  • VANET (Vehicular Ad hoc NETwork) is one of the special cases of the ad hoc networks in which car nodes communicate with each other and/or with RSUs (Road Side Unit) in order for the drivers to receive nearby road traffic information as well as for the passengers to retrieve nearby gas price or hotel information. In case of constructing VANET over CCN, users do not need to specify a destination server address rather to input a key word such as nearby congestion in order to gather surrounding traffic congestion information. Furthermore, each car node caches its retrieved data for forwarding other nodes when requested. In addition, the data transmission is inherently multicast, which implies fast data propagation to the participating car nodes. This paper measures and evaluates the data transmission performance of the VCCN (VANET over CCN) in which nodes are equipped with diverse wireless communication channels. The simulation result indicates that 802.11a shows the best performance of the data transmission against other wireless channels. Moreover, it indicates that VCCN improves overall data transmission and provides benefit to the nodes that request the same traffic information by exploiting inherent multicast communication.

A Study on Fault Location Using Wavelet in 154kV Transmission Power Cable (154kV 지중송전케이블에서 Wavelet을 이용한 Fault Location에 관한 연구)

  • Lee, Jun-Sung;Lee, Jong-Beom;Moon, Sung-Chall
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.437-439
    • /
    • 2000
  • This paper describes a fault location technique using wavelets in underground transmission cable system Estimation of fault location is performed using data sampled at two ends of underground system. In the case of 50% fault of total underground transmission line, fault location is calculated using sampled single-end data in underground transmission line. Traveling wave is utilized in capturing the travel time of the transients along the monitored lines between the relay and the fault point. This travel time information is provided by the wavelet. Simulation was performed using EMTP. ATP Draw and MATLAB. The results of fault location shown in this paper will be evaluated as an effective suggestion for fault to location in real underground transmission line.

  • PDF

The Optimal Link Scheduling in Half-Duplex Wireless Mesh Networks Using the Constraint Programming (제약식 프로그래밍을 이용한 일방향 전송 무선 메쉬 네트워크에서의 최적 링크 스케쥴링)

  • Kim, Hak-Jin
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.2
    • /
    • pp.61-80
    • /
    • 2016
  • The wireless mesh network (WMN) is a next-generation technology for data networking that has the advantage in cost and the flexibility in its construction because of not requiring the infra-structure such as the ethernet. This paper focuses on the optimal link scheduling problem under the wireless mesh network to effectuate real-time streaming by using the constraint programming. In particular, Under the limitation of half-duplex transmission in wireless nodes, this paper proposes a solution method to minimize the makespan in scheduling packet transmission from wireless nodes to the gateway in a WMN with no packet transmission conflicts due to the half-duplex transmission. It discusses the conflicts in packet transmission and deduces the condition of feasible schedules, which defines the model for the constraint programming. Finally it comparatively shows and discusses the results using two constraint programming solvers, Gecode and the IBM ILOG CP solver.

Development of a Load Spectrum of Tractor Transmission (트랙터 변속기의 부하 스펙트럼 개발)

  • 김대철;김경욱;이주완
    • Journal of Biosystems Engineering
    • /
    • v.23 no.6
    • /
    • pp.539-548
    • /
    • 1998
  • This study was intended to develop a load spectrum acting on a transmission of agricultural tractors. Transmission loads were measured at the input shaft of the transmission and final drive shaft of the tractors. The measurement were conducted in five field conditions at two speed levels under plowing operations in Korea. Two torque transducers were developed for the respective load measurements and other necessary instrumentations were made to collect the data and store them in a data logger. The time-histories of the torque loads were analyzed and transformed into the load spectra using the rainflow counting and Smith-Watson-Topper methods. Comparisons of the load spectra developed under different conditions were made to investigate their characteristics. The effects on the load levels of soil and plowing speeds were also investigated. Finally, a load spectrum combining the results of the spectrum analysis was developed and proposed as a load source for the reliability test of transmissions.

  • PDF