• Title/Summary/Keyword: wireless application

Search Result 1,722, Processing Time 0.024 seconds

Application of Wireless Measurement System for Safety Management of Temporary Substructures (가설공사 안전관리를 위한 무선계측 시스템 적용)

  • In, Chi-Hun;Rhim, Hong-Chul;Lee, Kun-Woo
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2009.05b
    • /
    • pp.21-24
    • /
    • 2009
  • This study deals with the application of USN wireless inclinometer sensor for earth retaining structure safety measurement, The application of wireless inclinometer sensor has great advantage about real-time monitoring of earth retaining structure, It allows a construction manager to monitor movement data from anywhere connected through internet during the process of excavation for substructures of buildings, To validate the applicability of the wireless inclinometer sensor. laboratory and field tests have been performed, The results have shown that the measured values of wireless inclinometer sensor represent the behavior of H-pile well, Both convenience of sensor installation and real-time monitoring of earth retaining structure are confirmed, The proposed wireless measurement system provides a good basis for exact measurement of temporary substructures, More measurements and application are expected for the other excavation sites with various conditions.

  • PDF

Analysis of Cryptography Technique on Application Layer based on WAP (WAP 기반의 Application Layer 암호화 기법 분석)

  • 황영철;최병선;이성현;이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.748-751
    • /
    • 2004
  • In this paper, we discuss about wireless Internet security. The past few years have seen unprecedented growth in the number of wireless user, applications, and network access technologies. Wireless Internet is similar to wired internet, but it has some constrained wireless environment. So many internet technologies for wireless are developing now. There are WAP(Wireless Application Protocol) and WPKI. WAP(now version 2.0) is a protocol specification for wireless communication networks. it provides an application framework and network protocols for wireless devices such as mobile telephones, PDAs and internet technologies. In this paper some analysis of security(e.g. digital signature or encryption) for wireless internet are performed.

  • PDF

Applying Artificial Intelligence Based on Fuzzy Logic for Improved Cognitive Wireless Data Transmission: Models and Techniques

  • Ahmad AbdulQadir AlRababah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.13-26
    • /
    • 2023
  • Recently, the development of wireless network technologies has been advancing in several directions: increasing data transmission speed, enhancing user mobility, expanding the range of services offered, improving the utilization of the radio frequency spectrum, and enhancing the intelligence of network and subscriber equipment. In this research, a series of contradictions has emerged in the field of wireless network technologies, with the most acute being the contradiction between the growing demand for wireless communication services (on operational frequencies) and natural limitations of frequency resources, in addition to the contradiction between the expansions of the spectrum of services offered by wireless networks, increased quality requirements, and the use of traditional (outdated) management technologies. One effective method for resolving these contradictions is the application of artificial intelligence elements in wireless telecommunication systems. Thus, the development of technologies for building intelligent (cognitive) radio and cognitive wireless networks is a technological imperative of our time. The functions of artificial intelligence in prospective wireless systems and networks can be implemented in various ways. One of the modern approaches to implementing artificial intelligence functions in cognitive wireless network systems is the application of fuzzy logic and fuzzy processors. In this regard, the work focused on exploring the application of fuzzy logic in prospective cognitive wireless systems is considered relevant.

An Design and Implementation of WAP(Wireless Application Protocol) Emulator (WAP(Wireless Application Protocol) 에뮬레이터(Emulator)의 설계 및 구현)

  • 최철웅;장지산;신화종;김상국;신동규;신동일
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.135-137
    • /
    • 2000
  • 무선 인터넷 시장의 급속한 발전으로 인해 컨텐츠에 대한 사용자들의 다양한 요구가 증가되고 있고, 그로인해 WML과 WML Script를 개발자가 실제와 같은 상황에서 편리하게 개발할 수 있는 환경이 필요하게 되었다. 본 논문에서는 CP(Content Provider)들이 쉽고 편리하게 WML(Wireless Markup Language) 컨텐츠(Content)를 개발, 브라우징하기 위한 WAP(Wireless Application Protocol) Emulator의 설계와 구현에 대하여 기술한다. WAP Emulator는 WML 파싱(parsing) 모듈과 인터페이스(Interface)모듈, 그리고 Data Send/Receive 모듈로 구성되며, 디코딩(Decoding)된 WML 문서를 파싱하여 브라우저로 보여준다.

  • PDF

Implementation of an Application about Wireless Network Practice based on the Web (웹 기반 무선 네트워크 실습 애플리케이션 구현)

  • Lee, Seon Ung;Moon, Il-Young
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.1
    • /
    • pp.71-76
    • /
    • 2010
  • There are two ways of wireless network practice. One of the ways is to use wireless network equipments directly. And the other way is to use wireless network simulators. But they have some problems such that space limitation, required equipments and setting up the simulators for each wireless network practices. So, in this paper, we showed the model of application for students and professor is modeled from real practice environment. We also suggested algorithms for implementation of an application about wireless network practice based on web.

  • PDF

A Function Point Model for Measuring the Development Cost of Information Services using Wireless Data Broadcast

  • Seokjin Im
    • International journal of advanced smart convergence
    • /
    • v.13 no.1
    • /
    • pp.12-22
    • /
    • 2024
  • Software applications have a huge and inseparable impact on our lives. The complexity of the applications increases rapidly to support high performance and multifunction. Accordingly, the cost model for applications is increasingly important. Line of Code (LOC) and Man-Month (M/M) as the cost model measure the quantitative sides of the applications. Unlike them, Function Point (FP) measures the functionalities of the application. FP is efficient for estimating qualitative characteristics, but it is restricted to measuring the cost of an application using the wireless data broadcast which can support any number of clients. In this paper, we propose, a Function Point model for Information services using wireles data Broadcast (FPIB) to measure the development cost of an application that serves using the wireless data broadcast environment. FPIB adopts critical parameters of the wireless broadcast environment and the complexity of them to measure effectively the cost developing the application. Through the evaluation comparing the proposed FPIB with FP, we reveal the effectiveness of the proposed FPIB.

Data throughput measurement for Wireless LAN of IEEE 802.11g in mobile environment (고속이동환경에서 무선랜(IEEE 802.11g)의 데이터 전송속도 측정)

  • 오종택
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3A
    • /
    • pp.288-292
    • /
    • 2004
  • Recently the application area of wireless LAN has been increased, rapidly. The application area was limited in indoor, but as the data throughput and performance of wireless LAN becomes better the application is to extend to the Internet connection and wireless bridge in outdoor. In this paper, the data throughput of wireless LAN in mobile environment is measured, and the usability of wireless LAN for ITS, Telematics, and LBS is confirmed.

Data throughput measurement for Wireless LAN of IEEE 802.11g In Train environment (열차내 무선 통신을 위한 AP 설치 방안 연구)

  • Song, Yong-Soo;Han, Sung-Ho;Lee, Su-Gil
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.395-396
    • /
    • 2007
  • Recently the application area of wireless LAN has been increased, rapidly. The application area was limited in indoor, but as the data throughput and performance of wireless LAN becomes better the application is to extend to the Internet connection and wireless bridge in outdoor. In this paper, the data throughput of wireless LAN in mobile environment is measured, and the usability of wireless LAN for Train, Telematics, and LBS is confirmed.

  • PDF

A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks

  • Raazi, Syed Muhammad Khaliq-Ur-Rahman;Lee, Sung-Young
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.1
    • /
    • pp.23-51
    • /
    • 2010
  • Wireless Sensor Networks (WSN) have proved to be useful in applications that involve monitoring of real-time data. There is a wide variety of monitoring applications that can employ Wireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend upon the application, for which it is employed. Security requirements in WSN vary according to the application dependent network characteristics and the characteristics of an application itself. Key management is the most important aspect of security as some other security modules depend on it. We discuss application dependent variations in WSN, corresponding changes in the security requirements of WSN and the applicability of existing key management solutions in each scenario.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.