• Title/Summary/Keyword: limited sensor

Search Result 1,027, Processing Time 0.029 seconds

Comparisons of the diagnostic accuracies of optical coherence tomography, micro-computed tomography, and histology in periodontal disease: an ex vivo study

  • Park, Jin-Young;Chung, Jung-Ho;Lee, Jung-Seok;Kim, Hee-Jin;Choi, Seong-Ho;Jung, Ui-Won
    • Journal of Periodontal and Implant Science
    • /
    • v.47 no.1
    • /
    • pp.30-40
    • /
    • 2017
  • Purpose: Optical coherence tomography (OCT) is a noninvasive diagnostic technique that may be useful for both qualitative and quantitative analyses of the periodontium. Micro-computed tomography (micro-CT) is another noninvasive imaging technique capable of providing submicron spatial resolution. The purpose of this study was to present periodontal images obtained using ex vivo dental OCT and to compare OCT images with micro-CT images and histologic sections. Methods: Images of ex vivo canine periodontal structures were obtained using OCT. Biologic depth measurements made using OCT were compared to measurements made on histologic sections prepared from the same sites. Visual comparisons were made among OCT, micro-CT, and histologic sections to evaluate whether anatomical details were accurately revealed by OCT. Results: The periodontal tissue contour, gingival sulcus, and the presence of supragingival and subgingival calculus could be visualized using OCT. OCT was able to depict the surface topography of the dentogingival complex with higher resolution than micro-CT, but the imaging depth was typically limited to 1.2-1.5 mm. Biologic depth measurements made using OCT were a mean of 0.51 mm shallower than the histologic measurements. Conclusions: Dental OCT as used in this study was able to generate high-resolution, cross-sectional images of the superficial portions of periodontal structures. Improvements in imaging depth and the development of an intraoral sensor are likely to make OCT a useful technique for periodontal applications.

Backscatter Communication for Wireless-Powered Communication Networks (무선전력 통신네트워크를 위한 Backscatter 통신)

  • Choi, Shin Hyuk;Kim, Dong In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1900-1911
    • /
    • 2015
  • In this paper, we introduce backscatter communication for power-limited sensors to enable long-range transmission in wireless sensor networks, and envision a way to avoid doubly near-far problem in wireless-powered communication network (WPCN) with this technology. In backscatter based WPCN, users harvest energy from both the signal broadcasted by the hybrid access point and the carrier signal transmitted by the carrier emitter in the downlink, and then transmit their own information in a passive way via the reflection of the carrier signal using frequency-shift keying modulation in the uplink. We characterize the energy-free condition and the signal-to-noise ratio (SNR) outage zone in backscatter based WPCN. Further, we propose backscatter based harvest-then-transmit protocol to maximize the sum-throughput of the backscatter based WPCN by optimally allocating time for energy harvesting and information transmission. Numerical results demonstrate that the backscatter based WPCN increases significantly the transmission range and diminishes greatly the SNR outage zone.

The Study of Gigapixel Camera Technology and the Stunning High-Resolution Gigapixel Image Created by Utilizing a Robotic Panoramic Head and an Image-Stitching Technique (로봇파노라마헤드와 스티칭 기법을 활용한 기가픽셀 이미지의 생성과 기가픽셀카메라 기술)

  • Choi, Yeon Chan;Moon, Hee Jun;Kim, Dong Young;Ryu, Jae Yun;Shin, Ye Rang;Rim, Cheon-Seog
    • Korean Journal of Optics and Photonics
    • /
    • v.26 no.1
    • /
    • pp.44-53
    • /
    • 2015
  • Since the technology of current image sensors is limited to the megapixel class, it is necessary to use an image-stitching technique to create a gigapixel image from hundreds or thousands of photos taken by a megapixel image sensor. In this paper, we investigate the entire process of gigapixel camera technology employing a robotic panoramic head plus a stitching technique, and analyze the gigapixel camera technologies of Duke University and BAE Systems from the viewpoint of optical design structure. Hopefully this knowledge will lead to a new optical structure for a gigapixel camera. Meanwhile, we also perceive the need for additional image processing to reduce the noise of photos with a background of fog and mist, taken far from the camera lens.

A Performance Test for Assessment of the RFID/USN Inter-working System's Applicability to the Construction Industry (RFID/USN 연동 시스템의 건설 산업 적용을 위한 성능 실험에 관한 연구)

  • Yoo, Ji-Yeon;Choi, Nu-Ri;Kim, Chang-Wan;Kim, Hyoung-Kwan;Han, Seung-Heon;Kim, Moon-Kyum
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.880-885
    • /
    • 2007
  • In the last decades, the resource used in the construction process has become much more various in kinds and increased in number as construction has become enlargement and complexity. Resource management on a construction site has been recognized as a detrimental factor to influence project success, therefore various technologies have been applied by the construction industry to streamline resource management. RFID/USN interworking system composed of RFID technology and sensor network supports automation of resource management and real-time information networking. Most of research efforts for RFID technology in the construction industry have been limited to object identification technology. The study proposed herein it to verify the applicability of RFID/USN interworking system to the construction industry. The identification rates of RFID/USN interworking system by distance and degree and by type of materials was identified and analyzed.

  • PDF

Systematic Network Coding for Computational Efficiency and Energy Efficiency in Wireless Body Area Networks (무선 인체 네트워크에서의 계산 효율과 에너지 효율 향상을 위한 시스테매틱 네트워크 코딩)

  • Kim, Dae-Hyeok;Suh, Young-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10A
    • /
    • pp.823-829
    • /
    • 2011
  • Recently, wireless body area network (WBAN) has received much attention as an application for the ubiquitous healthcare system. In WBAN, each sensor nodes and a personal base station such as PDA have an energy constraint and computation overhead should be minimized due to node's limited computing power and memory constraint. The reliable data transmission also must be guaranteed because it handles vital signals. In this paper, we propose a systematic network coding scheme for WBAN to reduce the network coding overhead as well as total energy consumption for completion the transmission. We model the proposed scheme using Markov chain. To minimize the total energy consumption for completing the data transmission, we made the problem as a minimization problem and find an optimal solution. Our simulation result shows that large amount of energy reduction is achieved by proposed systematic network coding. Also, the proposed scheme reduces the computational overhead of network coding imposed on each node by simplify the decoding process.

New Secure Network Coding Scheme with Low Complexity (낮은 복잡도의 보안 네트워크 부호화)

  • Kim, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.4
    • /
    • pp.295-302
    • /
    • 2013
  • In the network coding, throughput can be increased by allowing the transformation of the received data at the intermediate nodes. However, the adversary can obtain more information at the intermediate nodes and make troubles for decoding of transmitted data at the sink nodes by modifying transmitted data at the compromised nodes. In order to resist the adversary activities, various information theoretic or cryptographic secure network coding schemes are proposed. Recently, a secure network coding based on the cryptographic hash function can be used at the random network coding. However, because of the computational resource requirement for cryptographic hash functions, networks with limited computational resources such as sensor nodes have difficulties to use the cryptographic solution. In this paper, we propose a new secure network coding scheme which uses linear transformations and table lookup and safely transmits n-1 packets at the random network coding under the assumption that the adversary can eavesdrop at most n-1 nodes. It is shown that the proposed scheme is an all-or-nothing transform (AONT) and weakly secure network coding in the information theory.

Integrating GPS/INS/PL for Robust Positioning: The Challenging Issues

  • Wang, Jinling;Babu, Ravindra;Li, Di;Chan, Franics;Choi, Jin-Ho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.127-132
    • /
    • 2006
  • The Global Positioning System (GPS), Inertial Navigation System (INS) and Pseudolite (PL) technologies all play very important roles in navigation systems. As an independent navigation system, GPS can provide high precision positioning results which are independent of time. However, the performance will become unreliable when the system experiences high dynamics, or when the receiver is exposed to jamming or RF interference. In comparison to GPS, though INS is autonomous and provides good short-term accuracy, its use as a standalone navigation system is limited due to the time-dependent growth of the inertial sensor errors. PLs are ground-based transmitters that can transmit GPS-like signals. They have some advantages in that their positions can be determined precisely, and the Signal-to-Noise Ratios (SNR) are relatively high. Because their combined performance, in principle, overcomes the shortcomings of the individual systems, the integration of GPS, INS and PL is increasingly receiving attention from researchers. Depending on the desired performance vs complexity, system integration can be carried out at different levels, namely loose, tight and ultra-tight coupling. Compared with loose and tight integration, although it is more complex in terms of system design, ultra-tight integration will be the basis of the next generation of reliable and robust navigation systems. Its main advantages include improved performance under exposure to high dynamics, and jamming and RF interference mitigation. This paper presents an overview of the ultra-tight integration developments and discusses some of the challenging issues.

  • PDF

An Improved ID-based Anonymous Authentication Scheme for Wireless Body Area Networks (WBAN 환경에서의 개선된 ID 기반 익명 인증 기법)

  • Jeong, Min-Soo;Suk, Jae Hyuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.322-332
    • /
    • 2017
  • Wireless Body Area Networks is an environment that provides an appropriate service remotely by collecting user's biometric information. With the growing importance of sensor, WBAN also attracts extensive attention. Since WBAN is representatively used in the medical field, it can be directly related to the patient's life. Hence security is very important in WBAN. Mutual authentication between the client and the application provider is essential. And efficiency is also important because a used device is limited to computation cost. In this reason, ID-based anonymous authentication scheme in WBAN has been intensively studied. We show that the recent research result of Wu et al. which is about the ID-based anonymous authentication scheme is vulnerable to impersonation attack. And we propose a new ID-based anonymous authentication scheme that is secure against the attacks discovered in the existing schemes. Compared to the existing schemes, the computation cost of our scheme is improved by 30.6% and 7.3%.

Implementation of Binaural Communication Open Platform for Binaural Hearing Aids Developing (양이 보청기 개발을 위한 양이 통신 오픈 플랫폼 구현)

  • Kim, Dong-Wook;Park, Ju-Man;Wei, Qun;Lim, Hyung-Gyu;Park, Hee-Joon;Seong, Ki-Woong;Lee, Jyung-Hyun;Kim, Myoung-Nam;Cho, Jin-Ho
    • Journal of Sensor Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.272-278
    • /
    • 2011
  • Recently, the performance of binaural hearing aids is rapidly improved with the technology advancement of wireless communication, digital signal processing, and integrated circuit design. However, the previous hearing aids developer platforms can't be applied to binaural hearing aids developing, because it has no consideration for wireless communication and binaural hearing control. Also, the previous developer platforms are not easy to use for the algorithm development, because programming languages are limited. In this paper, we designed and implemented the open platform board for binaural hearing aids developing. The designed board can be programmed by general programming language and can be used wireless communication module. In order to verify the designed open platform board, we used the volume control algorithm using two open platform board. As a result of experiment, we verified the performance of designed and implemented open platform board that was successfully operated the binaural hearing control and the wireless communication.

Access Control Mechanism for Secure CoAP Applications Based on DTLS (DTLS 기반의 안전한 CoAP 응용을 위한 접근제어 메커니즘)

  • Jeong, Yeon-seong;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1307-1315
    • /
    • 2017
  • While the PSK mode of the DTLS is the most efficient in terms of the performance, it is not easy to pre-distribute and manage the symmetric key pairs as the number of sensor devices increases. On the other hand, both the RPK and certificate modes offer a convenient key management tool, but they do not guarantee a good computational performance. In this paper, the end-to-end security protocol suitable for the constrained devices is proposed, based on both the ECQV certificate and the PSK mode. Namely, the initial DTLS handshake is performed using the ECQV certificate, and the subsequent DTLS handshakes with the other CoAP servers in the same group are performed using the PSK mode for the purpose of reducing the overall computational load. Furthermore, a fine-grained access control for the CoAP client can be enforced to allow access to the limited number of CoAP servers.