• Title/Summary/Keyword: device access

Search Result 951, Processing Time 0.032 seconds

Design and Implementation of a Mobile Terminal Device for Video Transmission in Multiple Networks (다중 네트워크에서의 동영상 전송을 위한 이동 단말 장치의 설계 및 구현)

  • Kim, Jong-Heon;Lee, Dong-Soo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.2
    • /
    • pp.38-44
    • /
    • 2013
  • In this paper, we designed and implemented a mobile video transmission device with 1080i resolution and 30fps frame rate using wireless multi-access technologies. The video acquisition delay time of 16us and jitter of 21ms for this equipment were obtained, respectively. The device is designed to access various communication networks. In order to evaluate the performance of its video transmission capability, a server and monitoring viewer are implemented. In the performance test using LTE network, 211ms delay time was obtained at 3Mbps transmission. Rendering of 1fps frame rate at the 265kbps transmission was confirmed for the transmission test using Inmarsat network.

A Study on the Effect of Recognition Distance According to RSSI Change of BLE Packet (BLE패킷의 RSSI변화에 따른 인식거리의 영향 연구)

  • June Young Lee;Young Tae Lee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.2
    • /
    • pp.72-76
    • /
    • 2023
  • The mobile card system used for mobile access control is connected to the door lock mounted on the door, enabling non-contact control. The RSSI (Received Signal Strength Indicator) of the BLE (Bluetooth Low Energy) communication packet used here can help to know the direction and distance of the mobile device. In this study, the desirable access control distance was calculated and implemented by setting the RSSI of the transmitter of the BLE packet used in mobile access control and processing the RSSI of the receiver.

  • PDF

The Analysis on the Upsteam band Signal in the HFC Access Network (HFC 가입자망 상향대역 신호분석에 관한 연구)

  • 장문종;김선익;이진기
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.142-144
    • /
    • 2004
  • To provide more qualified data service on the HFC(Hybrid-Fiber Coaxial) access network, the channel characteristics of upstream transmission band should be carefully investigated and analysed. It will be easier to do network management if the monitoring system for noise measurement in the network is available, In this paper, noise analysis method and the frequency selection method in the upstream band for duplex transmission are suggested. And, Data aquisition device for the signal measurement Is implemented. With this network monitoring system, field test and the result from the collected data are described.

  • PDF

Java-based LonTaIk/IP Network for Predictive Maintenance (PM)

  • Park, Gi-Heung
    • Proceedings of the Korean Institute of Industrial Safety Conference
    • /
    • 2001.11a
    • /
    • pp.31-35
    • /
    • 2001
  • Recent trends require that access to the device/equipment information be provided from several locations or anywhere in the enterprise. One example is virtual machine/manufacturing system (VMS) where predictive maintenance is performed both on factory floor and in remote site through internet [1]. Internet access is increasingly available and affordable, and along with the "internet" is the backbone of modern enterprise data networks. Typical functions of such a system includes monitoring and control for diagnosis and remedy action in realizing preventive maintenance.(omitted)

  • PDF

Wireless DDoS Attack Detection and Prevention Mechanism using Packet Marking and Traffic Classification on Integrated Access Device (IAD 기반 패킷 마킹과 유무선 트래픽 분류를 통한 무선 DDoS 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo;Park, Yeoung-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.54-65
    • /
    • 2008
  • When DDoS attack is achieved, malicious host discovering is more difficult on wireless network than existing wired network environment. Specially, because wireless network is weak on wireless user authentication attack and packet spoofing attack, advanced technology should be studied in reply. Integrated Access Device (IAD) that support VoIP communication facility etc with wireless routing function recently is developed and is distributed widely. IAD is alternating facility that is offered in existent AP. Therefore, advanced traffic classification function and real time attack detection function should be offered in IAD on wireless network environment. System that is presented in this research collects client information of wireless network that connect to IAD using AirSensor. And proposed mechanism also offers function that collects the wireless client's attack packet to monitoring its legality. Also the proposed mechanism classifies and detect the attack packet with W-TMS system that was received to IAD. As a result, it was possible for us to use IAD on wireless network service stably.

Design of the 1.5kVA Class Wireless Power Transfer Device for Battery Charging of Integrated Power Control System in MSAP (군 이동기지국시스템(MSAP) 통합전원제어장치 배터리 충전용 1.5kVA급 무선전력전송기기의 설계)

  • Kim, Jin-Sung;Kim, Byung-Jun;Park, Hyeon-Jeong;Seo, Min-Sung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.413-420
    • /
    • 2020
  • The Tactical Information and Communication Network system provides real-time multimedia services such as voice and data by utilizing the Mobile Subscriber Access Point. At this time, an external transmission path is constructed through the Low Capacity Trunk Radio and the High Capacity Trunk Radio system. The communication devices of each wireless transmission system are mounted on a tactical vehicle and a secondary battery is used to prevent a power interruption when the supply power to the tactical vehicle is transferred to the integrated power control device. In this paper, the basic design of the Wireless Power Transfer device for charging the battery of the integrated power control system of the mobile base station system using the Loading Distribution Method and checking the number of primary windings and the core material selection by the air gap through the Finite Elements Method.

OWC based Smart TV Remote Controller Design Using Flashlight

  • Mariappan, Vinayagam;Lee, Minwoo;Choi, Byunghoon;Kim, Jooseok;Lee, Jisung;Choi, Seongjhin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.71-76
    • /
    • 2018
  • The technology convergence of television, communication, and computing devices enables the rich social and entertaining experience through Smart TV in personal living space. The powerful smart TV computing platform allows to provide various user interaction interfaces like IR remote control, web based control, body gesture based control, etc. The presently used smart TV interaction user control methods are not efficient and user-friendly to access different type of media content and services and strongly required advanced way to control and access to the smart TV with easy user interface. This paper propose the optical wireless communication (OWC) based remote controller design for Smart TV using smart device Flashlights. In this approach, the user smart device act as a remote controller with touch based interactive smart device application and transfer the user control interface data to smart TV trough Flashlight using visible light communication method. The smart TV built-in camera follows the optical camera communication (OCC) principle to decode data and control smart TV user access functions according. This proposed method is not harmful as radio frequency (RF) radiation does it on human health and very simple to use as well user does need to any gesture moves to control the smart TV.

A Sensor Node Operating System Supporting Sensor Abstractions for Ease Development of USN Applications (용이한 USN 응용 개발을 위한 센서추상화 지원 센서노드 운영체제)

  • Eun, Seong-Bae;So, Sun-Sup;Kim, Byeong-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.371-379
    • /
    • 2009
  • Conventional sensor node operating systems do not support sensor abstraction for sensor applications. So, application programmers have to take charge of developing the hardware and the device drivers for the applications by themselves. In this paper, we present an as architecture to support sensor abstraction. The as provide not only application programmers with API library to access sensor devices, but also sensor developers with HAL library to access sensor hardware. This can reduce the development burden of application programmers significantly. In this paper, at first, we define the sensor HW interface to ease the attachment of sensors. Second, we describe the sensor access API for application programmers. Third, we define the HAL library for sensor device programmers to use. Finally, we show that the as can support sensor abstraction by illustrating the sample programs.

Personal-usage Authentication of Broadcast Programs Using a Secure Portable Storage (휴대용 보안 저장매체 기반 방송프로그램 사적이용 인증 기법)

  • Lee, Joo-Young;Choo, Hyon-Gon;Nam, Je-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.10-18
    • /
    • 2009
  • In this paper, we propose a novel method for authenticating a user's personal-usage using a secure portable storage, so that the user carrying the secure portable storage is able to consume his/her own broadcast programs freely, regardless of the location of the devices. The proposed authentication process is performed by a portable personal-usage authentication device, an access-control module for the portable personal-usage authentication device, and a player integrating the access control module. The portable personal-usage authentication device plays a role of secure storage in which domain authentication information is securely stored, while the access-control module is in charge of accessing the authentication information and, consequently, acquiring a decryption key. The player decrypts the broadcast programs in real time and processes the decrypted media streams. In this Paper, we describe the structure and procedure of the proposed model, and verify its feasibility by implementation.