• Title/Summary/Keyword: radio access technology

Search Result 261, Processing Time 0.022 seconds

Design and Prototype Implementation of Museum Asset Management System Using Mobile RFID Devices (모바일 RFID 장치를 이용한 박물관 관리 시스템 설계 및 구현)

  • Kim, Young-Il;Cheong, Tae-Su
    • Proceedings of the CALSEC Conference
    • /
    • 2005.11a
    • /
    • pp.78-84
    • /
    • 2005
  • As the research activities related to 'Ubiquitous Computing' whose concept was introduced by Mark Weiser are growing, RFID(Radio Frequency Identification) technology has recently gained attention as a technology to advance the ubiquitous computing and a lot of related researches are also in progress. Research works done so far are mainly linked to the situation that the research outputs apply to meet the requirements for asset tracking and data sharing with partners over supply chain by using fixed RFID readers. However, it is essential that users have access to real-time information about the tagged objects and services whenever and wherever they want in the era of ubiquitous computing, so mobile devices-including PDA, smart phone, cellular phone, etc - which are equipped with an RFID reader can be regarded as an essential terminal for users living in ubiquitous computing environment. As far as the application with mobile devices are concerned, there are many considerations due to their limited capabilities of data processing, battery consumption and so on. In this paper, we review the generic RFID network model and introduce the revised RFID network model in consideration of incorporation with mobile devices equipped with an RFID reader. Also, we derive the requirements for software embedded within an RFID- enabled mobile terminal and then discuss essential components for implementation. Moreover, we develop the applications for asset management at museum by using mobile RFID network model.

  • PDF

Verification Techniques of the Distored iBeacon Information for Reliable Indoor Positioning Systems (신뢰성 있는 실내 위치 측위 시스템을 위한 왜곡된 iBeacon 정보의 검증 기법)

  • Yoon, Chang-Pyo;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.345-347
    • /
    • 2016
  • Recently location based services is being expanded into the indoor service that can not access to the outdoor location informations, such as GPS. Thus, the research and development of an indoor positioning system with BLE(Bluetooth Low Energy) iBeacon technology has expanded. However, RSSI (Received Signal Strength Indicator) that is used as the distance information between the terminal and for positioning iBeacon signal has a problem in that distortion occurs, information such as the signal attenuation and the delay due to the characteristics of radio waves. In this paper, we propose a reliable method of verifying iBeacon signal with the signal distortion problems for reliable indoor positioning systems.

  • PDF

Design and Implementation of a Bluetooth Baseband Module based on IP (IP에 기반한 블루투스 기저대역 모듈의 설계 및 구현)

  • Lim, Ji-Suk;Chun, Ik-Jae;Kim, Bo-Gwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1285-1288
    • /
    • 2002
  • Bluetooth wireless technology is a publicly available specification proposed for Radio Frequency (RF) communication for short-range and point-to- multipoint voice and data transfer. It operates in the 2.4GHz ISM(Industrial, Scientific and Medical) band and offers the potential for low-cost, broadband wireless access for various mobile and portable devices at range of about 10 meters. In this paper, we describe the structure and the test results of the bluetooth baseband module we have developed. This module was developed based on IP reuse. So Interface of each module such as link controller UART, and audio CODEC is designed based on ARM7 comfortable processor. We also considered various interfaces of related external chips. The fully synthesizable baseband module was fabricated in a $0.25{\mu}m$ CMOS technology occupying $2.79{\times}2.8mm^2$ area including the ARM TDMI processor. And a FPGA implementation of this module is tested for file and bit-stream transfers between PCs.

  • PDF

IEEE 802.21 Standards Trends for Seamless Vertical Handover (Seamless Vertical 핸드오버를 위한 IEEE 802.21 표준 동향)

  • Lee, Seon-Ung;Moon, Il-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.438-440
    • /
    • 2010
  • As market expansion and demand for smart phone have increased, the wireless data trafic is rapidly growing now. To solve this problem, common carriers in Korea distribute the trafic over Wi-Fi. Smart phones have multi interfaces such as 3G radio, Wi-Fi, Bluetooth, and etc and can utilize them. However these interfaces support seamless handover between not different interfaces but same interfaces, so that users couldn't be supported continuity for handover. In this paper, we describe the Media Independent Handover(MIH) services that is proposed by IEEE 802.21. The standard enhance the handovers across heterogeneous access networks and to optimize the service continuity during handovers.

  • PDF

Analyses of Security Issues for Internet of Things in Healthcare Application (헬스캐어 시스템에서의 사물 인터넷 통신을 위한 보안 문제 분석)

  • Shin, Yoon-gu;Kim, Hankyu;Kim, Sujin;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.699-700
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other healthcare giver. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper defines a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic Personal Health Records. This security architecture is aimed to be used with a mobile e-health application (m-health) through a simple and intuitive interface, supported by RFID technology. This architecture, able to support secured and authenticated interactions, will enable an easy deployment of m-health applications. The special case of drug administration and ubiquitous medication control system, along with the corresponding Internet of Things context, is presented.

  • PDF

Spectrum Requirements for the Future Development of IMT-2000 and Systems beyond IMT-2000 (4세대 이동통신 서비스 주파수 소요량에 관한 연구)

  • Chung Woo-Ghee;Yoon Hyun-Goo;Lim Jae-Woo;Yook Jong-Gwan;Park Han-Kyu
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.2 s.105
    • /
    • pp.110-116
    • /
    • 2006
  • In this paper the algorithm of a methodology for the calculation of spectrum requirements was implemented. As well, the influence of traffic distribution ratio among radio access technology groups, spectral efficiency, and flexible spectrum usage(FSU) margin was analyzed in terms of the spectrum requirements, with a view toward for future development of IMT-2000 and systems beyond IMT-2000. The ratio of the spectrum requirement to the traffic distribution ratio is approximately $1\;GHz/20\;\%$, and the spectrum requirement varies from 5 to 9 GHz. As the FSU margin increases by 1.0 dB, the total spectrum requirement decreases by 0.9 dB. The required spectrum for the market input parameter, ${\rho}=0.5$ is 801.63 MHz, while the required spectrum for ${\rho}=1.0$ is 6295.4 MHz. It can be concluded that the market input parameter is the most effective parameter in the calculation of spectrum requirements.

A Power Amplifier for Portable Base Stations Operating in TVWS (TVWS를 이용하는 이동기지국용 전력증폭기)

  • Kang, Sanggee
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.110-114
    • /
    • 2017
  • Using a small mobile wireless network as a supplement to the disaster safety network can be useful for eliminating small radio shadowing areas, reducing traffic overloads in disaster areas, and quickly building a disaster communication network in difficult access areas. Potable base station is needed to build a small mobile wireless network, and the portable base station using TVWS(TV White Space) is effective in terms of utilization of radio frequency resources and construction cost of wireless networks. In this paper, we design and implement a power amplifier for portable base station operating in TVWS. The implemented power amplifier operates at 470 ~ 698MHz. The gain of the implemented amplifier is more than 20.1dB, the input/output return loss is more than 11.4dB, and the isolation is more than 39.9dB when the output is off. The IMD characteristic of the power amplifier has characteristics of 61.0dBc with 18.8dBm output at 470MHz, 59.3dBc wih 18.6dBm output at 550MHz and 56.5dBc with 19.0dBm output at 690MHz. The power amplifier implemented in this paper can be used as a power amplifier for portable base station.

MPTCP based Handover Scheme in PMIPv6 domain (PMIPv6 도메인에서 MPTCP 기반 Handover 기법)

  • Youn, Joo-Sang;Choi, Hun;Heo, Gyeong-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.71-80
    • /
    • 2014
  • Recently, most mobile nodes, such as smartphones, will have multiple wireless radio interfaces. This feature allows a mobile node to access a multi-network through multiple wireless radio interfaces simultaneously. Accordingly, various networking technology has been studied to use wireless multi-interface more efficiently. In this paper, MPTCP based handover scheme is proposed to reduce data loss and end-to-end latency during the handover in PMIPv6 domain. The proposed scheme performs 2-step flow mobility on the multi-path established through the multi-interface of mobile node in the handover procedure and uses MPTCP subflow function to overcome end-to-end disconnection during the handover. Therefore, the proposed scheme takes the advantage of being able to minimize data loss and a latency generated during performing the handover of mobile node.

A Call Admission Control Using Markovian Queueing Model for Multi-services Cognitive Radio Networks (멀티 서비스 무선 인지 망을 위한 마르코프 큐잉모델을 이용한 호 수락 제어)

  • Lee, Jin-Yi
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.4
    • /
    • pp.347-352
    • /
    • 2014
  • In this paper, we propose a Markovian queueing model(M/M/1)-based call admission control to reduce forced terminating rate of non-real secondary user's call for Multi-services Cognitive Radio Networks. A existing control has a problem that the forced terminating rate increases because of adopting a policy of spectrum priority allocation to real calls. In our scheme the rate can be reduced as the call that has no useful spectrum waits in a queue until getting an available spectrum. Our scheme use a neural-net based prediction of primary user's reappearance. Through the simulation, we analysis the call forced terminating rate, access delay and spectrum utilization efficiency, and then show that our scheme can more reduce the forced terminating rate of the call, compared to that of the existing algorithm.

A Study on Control of Drone Swarms Using Depth Camera (Depth 카메라를 사용한 군집 드론의 제어에 대한 연구)

  • Lee, Seong-Ho;Kim, Dong-Han;Han, Kyong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.8
    • /
    • pp.1080-1088
    • /
    • 2018
  • General methods of controlling a drone are divided into manual control and automatic control, which means a drone moves along the route. In case of manual control, a man should be able to figure out the location and status of a drone and have a controller to control it remotely. When people control a drone, they collect information about the location and position of a drone with the eyes and have its internal information such as the battery voltage and atmospheric pressure delivered through telemetry. They make a decision about the movement of a drone based on the gathered information and control it with a radio device. The automatic control method of a drone finding its route itself is not much different from manual control by man. The information about the position of a drone is collected with the gyro and accelerator sensor, and the internal information is delivered to the CPU digitally. The location information of a drone is collected with GPS, atmospheric pressure sensors, camera sensors, and ultrasound sensors. This paper presents an investigation into drone control by a remote computer. Instead of using the automatic control function of a drone, this approach involves a computer observing a drone, determining its movement based on the observation results, and controlling it with a radio device. The computer with a Depth camera collects information, makes a decision, and controls a drone in a similar way to human beings, which makes it applicable to various fields. Its usability is enhanced further since it can control common commercial drones instead of specially manufactured drones for swarm flight. It can also be used to prevent drones clashing each other, control access to a drone, and control drones with no permit.