• Title/Summary/Keyword: electronic communications

Search Result 1,395, Processing Time 0.028 seconds

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.

Aspect of the chief of state guard EMP (Electro Magnetic Pulse) protection system for the consideration (국가원수 경호적 측면에서의 EMP(Electro Magnetic Pulse) 방호 시스템에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.37-66
    • /
    • 2014
  • In recent years, with the development of computers and electronics, electronics and communication technology in a growing and each part is dependent on the cross-referencing makes all electronic equipment is obsolete due to direct or indirect damage EMP. Korea and the impending standoff North Korea has a considerable level of technologies related to the EMP, EMP weapons you already have or in a few years, the development of EMP weapons will complete. North Korea launched a long-range missile and conducted a nuclear test on several occasions immediately after, when I saw the high-altitude nuclear blackmail has been strengthening the outright offensive nuclear EMP attacks at any time and practical significance for the EMP will need offensive skills would improve. At this point you can predict the damage situation of Korea's security reality that satisfy the need, more than anything else to build a protective system of the EMP. The scale of the damage that unforeseen but significant military damage and socio-economic damage and fatalities when I looked into the situation which started out as a satellite communications systems and equipment to attack military and security systems and transportation, finance, national emergency system, such as the damage elsewhere. In General, there is no direct casualties reported, but EMP medical devices that rely on lethal damage to people who can show up. In addition, the State power system failure due to a power supply interruption would not have thought the damage would bring State highly dependent on domestic power generation of nuclear plants is a serious nuclear power plant accident in the event of a blackout phenomenon can lead to the plant's internal problems should see a forecast. First of all, a special expert Committee of the EMP, the demand for protective facilities and equipment and conduct an investigation, he takes fits into your budget is under strict criteria by configuring the contractors should be sifting through. He then created the Agency for verification of performance EMP protection after you have verified the performance of maintenance, maintenance, safety and security management, design and construction company organized and systematic process Guard facilities or secret communications equipment and perfect for the EMP, such as protective equipment maneuver system should take.

  • PDF

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Transactive Memory System of a Virtual Team : Theoretical Exploration and Empirical Examination (가상 팀의 교류활성기억 시스템과 팀 성과의 관계 : 가상 팀 속성을 선행요인으로)

  • Shin, Kyung-Shik;Suh, A-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.2
    • /
    • pp.137-166
    • /
    • 2010
  • A virtual team is defined a group of people that use electronic communications for some or all of their interactions with other team members. Because team members of a virtual team are physically and temporally distributed, a team's transactive memory system(TMS) is considered to be crucial for the team's effectiveness and performance. TMS refers to a set of individual memory systems which integrate knowledge possessed by particular members through a shared awareness of who knows what. This paper seeks to understand (1) how a virtual team's TMS influences team performance, and (2) what factors contribute to developing the team's TMS. Given these purposes, through the extensive literature review, we first identified components and antecedents to develop a theoretical model that predicts a virtual team's performance. Using the survey data gathered from 172 virtual teams, this study found that expertise location, coordination, and cognition-based trust which were proposed as three components of TMS positively influenced a virtual team's performance. Furthermore, this study uncovered that perceived media richness, network tie strength, and shared norms significantly influenced the components of TMS, while geographical dispersion did not exert any significant influence on TMS.

A Study on Manufacturing Method of High Performance Smart EMW Absorber with Heat Radiating Function and Its Prospects (방열 기능형 고성능 스마트 전파흡수체 제조 방법 개발 및 전망)

  • Kim, Dong Il;Jeon, Yong Bok
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.10
    • /
    • pp.841-850
    • /
    • 2015
  • With the rapid progress of electronics and radio communication technology, human enjoys greater freedom in information communication. However, EMW(Electro-Magnetic Wave) environments have become more complicate and difficult to control. Thus, international organizations, such as the American National Standard Institution(ANSI), Federal Communications Commission(FCC), the Comite Internationale Special des Perturbations Radio Electrique(CISPR), etc, have provided standard for controlling the EM wave environments and for the countermeasure of the electromagnetic compatibility(EMC). In this paper, fabrication of the smart EMW absorber which has heat radiating function and high performance absorption abilities were suggested. Furthermore, we prospected future smart EMW absorbers. The designed smart EMW absorber is fabricated following process. Firstly, we applied high temperature heat treated to a mixture of Iron-oxide($Fe_2O_3$) and ceramics. Secondly, we applied low temperature heat treated to the mixture of heat treated material and a carbon material. Lastly, we made apertures on the absorber. The designed smart EM wave absorber has the absorption ability of more than 20 dB from 2 GHz to 2.45 GHz band, respectively. Thus, it is respected that these results can be applied as various EMC devices in electronic, communication, and controlling systems.

Implementation of Control Point, Digital TV, and Light Controller Emulator on Embedded System Using UPnP Home Networking Control Middleware (홈 네트워킹 제어 미들웨어인 UPnP를 이용한 Control Point 및 내장형 시스템 상에서의 DTV와 전등 제어기 에뮬레이터 구현)

  • Jeon Ho-In
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.1 no.1
    • /
    • pp.6-25
    • /
    • 2002
  • In this paper, we have implemented UPnP Devices which emulate a Control Point, a Light Controller, and a Digital TV. The Control Point has been developed on Linux host system by using C language. The UPnP Devices emulating the Digital TV and Light Controller are running on embedded linux developer board. For the development of UPnP Devices, UPnP SDK API Vl.04 made by Intel Co. Ltd. has been ported on Assabet Linux Reference board to implement the UPnP protocol. After we analyze and design some services of Digital TV device, we have applied UPnP Device program to those devices. UPnP SDK vl .04 consists of APIs which support HTTP, SSDP, SOAP, GENA and XML DOM Level-1 that are cores of UPnP protocol. The C program written for the UPnP Control Point has been compiled and executed on Linux-based PC. The embedded system running on Embedded Linux OS has been connected all together through Ethernet which allows IP-based communications. Under this environment, the UPnP programs are being executed on each device. Control Point, when in operational mode, discovers UPnP Devices on the network and displays the device list on the consol. By selecting one of the functionalities of the device services that are displayed on the Control Point, the controllability has been accomplished. The experiment that we performed in this thesis have revealed that the Control Point and UPnP Devices have supported the protocols including SSDP, SOAP, GENA, and DHCP.

  • PDF

A study of mitigated interference Chaotic-OOK system in IEEE802.15.4a (IEEE 802.15.4a 채널환경하에서의 저간섭 Chaotic OOK 무선통신기술의 BER 성능분석에 관한 연구)

  • Jeong, Jae-Ho;Park, Goo-Man;Jeon, Tae-Hyun;Seo, Bo-Seok;Kwak, Kyung-Sup;Jang, Yeong-Min;Choi, Sang-Yule;Cha, Jae-Sang
    • Journal of Broadcast Engineering
    • /
    • v.12 no.2
    • /
    • pp.148-158
    • /
    • 2007
  • Recently, IEEE 802.15.4a(low-rate UWB) technique has been paid much attention to the LR-UWB communication system for WPAN. However, there are various interferences such as MPI(Multi Path Interference) or IPI(Inter Piconet Interference) in IEEE 802.15.4a wireless channel. In order to cancel various interferences occurred to WPAN environment, in this paper, we propose a UWB wireless communication system with high QoS(Quality of Service) which is a chaotic-OOK(On-Off Keying) system using unipolar ZCD(Zero Correlation Duration) spreading code in physical layer level. Furthermore, we analyze its performance via simulations and verify the availability of proposed system with prototype implementation.

Edge Detection System for Noisy Video Sequences Using Partial Reconfiguration (부분 재구성을 이용한 노이즈 영상의 경계선 검출 시스템)

  • Yoon, Il-Jung;Joung, Hee-Won;Kim, Seung-Jong;Min, Byong-Seok;Lee, Joo-Heung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.21-31
    • /
    • 2017
  • In this paper, the Zynq system-on-chip (SoC) platform is used to design an adaptive noise reduction and edge-detection system using partial reconfiguration. Filters are implemented in a partially reconfigurable (PR) region to provide high computational complexity in real-time, 1080p video processing. In addition, partial reconfiguration enables better utilization of hardware resources in the embedded system from autonomous replacement of filters in the same PR region. The proposed edge-detection system performs adaptive noise reduction if the noise density level in the incoming video sequences exceeds a given threshold value. Results of implementation show that the proposed system improves the accuracy of edge-detection results (14~20 times in Pratt's Figure of Merit) through self-reconfiguration of filter bitstreams triggered by noise density level in the video sequences. In addition, the ZyCAP controller implemented in this paper enables about 2.1 times faster reconfiguration when compared to a PCAP controller.

The Effect of Online WOM of Menu Product Consumers on Product Perception Risk and WOM Effect

  • HEO, Yeong-Wook
    • Journal of Distribution Science
    • /
    • v.18 no.3
    • /
    • pp.77-85
    • /
    • 2020
  • Purpose: This study examined marketing value as online word-of-mouth media in the foodservice industry, and it did research on online word-of-mouth (e-WOM) communication marketing schemes using mass communication in the industry. The study is also intended to investigate the impact of electronic word-of-mouth (e-WOM) information and communication on product awareness risks, benefits, and word-of-mouth (WOM) impacts on restaurant consumers. Research design, data, and methodology: The analysis was conducted on a valid questionnaire of 425 menu product consumers. The survey was conducted for two months in March 2019. The collected data was analyzed using SPSS and hierarchical regression analysis was applied. Results: It did empirical research on the reciprocal casual relations to online and the existing word-of-mouth communication that have to be preceded to understand characteristics of online word-of-mouth communication for the purpose of this study. The result is summarized as follows. First, the online word-of-mouth (e-WOM) effect on product recognition risk shows the statistically significant effect of information sender characteristics, information recipient characteristics, and online word-of-mouth (e-WOM) communication on product recognition risk. Second, the influence of online word-of-mouth (e-WOM) on product risk benefits shows that the information sender characteristics, the information receiver characteristics, and online communications have a statistically significant effect on product risk benefits. Third, online word of mouth risk recognition had a statistically significant effect on word of mouth acceptance. Fourth, online risk benefit had a statistically significant positive effect on word of mouth (WOM) effect. Conclusions: The communication between online word of mouth (e-WOM) sender and recipient had a positive influence on the product evaluation and attitude change in the foodservice industry, and the word-of-mouth (WOM) effect affected financial and non-financial performance. The results mentioned above indicated that the communication between the sender of the information and the receiver of the information had a positive effect on the product evaluation and attitude change of the menu consumer, and the word-of-mouth (WOM) result affected the financial. Therefore, the online word-of-mouth (e-WOM) effect has a positive effect on the word-of-mouth (WOM) effect of menu products when performed simultaneously and positively between the information sender and the information receiver.

Analysis and Proposal of Communication System for Maritime HF Band Digital Data Exchange (해상 HF대역 디지털 데이터 교환을 위한 통신시스템 분석 및 제안)

  • Choi, Sung-Cheol;So, Ji-Eun;Park, Hyung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2249-2260
    • /
    • 2017
  • IMO (International Maritime Organization) has been providing GMDSS (Global Maritime Distress and Safety System) and mandating to install distress and safety systems according to SOLAS. Digital-HF(High-Frequency) coast station communication system maintains interoperability between ship and coast station and digital data exchange in maritime mobile service by digitizing existing analog base voice communication. In this paper, we analyze ITU-R M. 1798-1 established by ITU for digital HF communications and propose Advanced annex2 and new Annex 5 to improve the problems of the existing Annex 2 and Annex 4. The proposed OFDM protocol basically adopts ARQ (Automatic Retransmission Request) which retransmits when an error occurs in a half-duplex manner between an information transmitting side (ISS) and an information receiving side (IRS) and we propose a digital HF communication system and its operational concept which is more reliable and superior than the existing ITU-R M. 1798 by implementing technical development on implementation and performance improvement.